IMM-2026-0040
ACTIVE
Keccak
0x32d7f0083727539955c55c43a10b28569b2fcb02c56d6dd0db0149ded7e4c516
Type
CALL_PATTERN
Verdict
MALICIOUS
Confidence
92.0%
Severity
91
Value at risk
$0.00
Created
April 29, 2026 5:58 PM
Envelope
v1
Signed payload
Primary matcher
call_pattern
0x098b716b8aaf21512996dc57eb0615e2383e2f96 0xd505accf
Scope
galileo-testnet
home
sepolia
Evidence
redacted public excerpt
Reasoning excerpt
EIP-2612 permit() call submitting a victim's gasless signature with the Atomic Wallet drainer as the spender. Permit-based drains are particularly damaging because the victim's wallet UI shows a signature request rather than a transaction, lowering the suspicion threshold. MALICIOUS at the highest confidence: the only reason to submit a permit naming a sanctioned-attribution drainer is to execute a drain. Severity reflects the full-balance approval semantics of permit.
Full evidence (TEE-sealed) is fetchable by holders of the unsealing key. Public mirror carries hash only.
TEE attestation
Curated by human
Heuristically published from a known threat catalog, not derived from a TEE-verified verdict.
Evidence CID
0x69eb76f07e2d87af63388fcfc18dc3f4f15d875471e05a2e2d3b26bc70342348
Network impact
Live
Since publish
Cache hits
0
SDK check() matches
Agents synced
0
distinct callers
Attacks blocked
0
tx-level intercepts
Pool reverts
0
Uniswap v4 hook
USD protected
$0.00
no blocks recorded yet
Hits over time
each bar is one of 30 equal slices since publish
publish
now
Recent intercepts
| Agent | Method | Chain | When |
|---|---|---|---|
|
No agent has had to block this antibody yet.
Intercepts appear here in real time as agents match this pattern in the wild.
|
|||
| Chain | Tx | State |
|---|---|---|
|
sepolia
|
0xa4e0c4f8..cbf4 | active |