IMM-2026-0025

ACTIVE
Keccak 0x5e67ae1b6eb167fa2c61191e1ad774bc897906f14a6a015794d8360a2b46f90d
Type
BYTECODE
Verdict
MALICIOUS
Confidence
83.0%
Severity
79
Value at risk
$0.00
Created April 29, 2026 5:23 PM
Envelope v1
Signed payload
Primary matcher bytecode
0x5e6f7a8b9c0d1e2f3a4b5c6d7e8f9a0b1c2d3e4f5a6b7c8d9e0f12345abcdef0
Scope
galileo-testnet home sepolia
Evidence redacted public excerpt
Reasoning excerpt
Bytecode of a widely-cloned sandwich-attack contract template, indexed by mevwatch.info and several Etherscan-verified deployments. The template implements the classic two-leg flash-frontrun-backrun pattern against AMM swaps. Verdict is MALICIOUS at moderate-high confidence: the contract's only honest use is sandwich MEV, but the practice itself is contested as 'abusive but legal' rather than fund-theft, which is reflected in the slightly lower severity.

Full evidence (TEE-sealed) is fetchable by holders of the unsealing key. Public mirror carries hash only.

TEE attestation
Curated by human
Heuristically published from a known threat catalog, not derived from a TEE-verified verdict.
Evidence CID
0x96f0036a7360634d8e7c4e3b7bd6264f82af821585b3579bb19df7800762c0b2
Network impact Live
Since publish
Cache hits
0
SDK check() matches
Agents synced
0
distinct callers
Attacks blocked
0
tx-level intercepts
Pool reverts
0
Uniswap v4 hook
USD protected
$0.00
no blocks recorded yet
Hits over time each bar is one of 30 equal slices since publish
publish now
Recent intercepts
Agent Method Chain When
No agent has had to block this antibody yet.
Intercepts appear here in real time as agents match this pattern in the wild.
Mirror status All chains synced
Chain Tx State
sepolia
0x9508da76..eabc active
1 of 1 chains mirrored
v2 feature

Challenge game coming soon

Challenges let anyone counter-stake on a published antibody they believe is wrong. The publisher loses their stake if a challenge succeeds; the challenger does if it fails. The on-chain mechanics are designed; the UI lands in v2.