IMM-2026-0040

ACTIVE
Keccak 0x32d7f0083727539955c55c43a10b28569b2fcb02c56d6dd0db0149ded7e4c516
Type
CALL_PATTERN
Verdict
MALICIOUS
Confidence
92.0%
Severity
91
Value at risk
$0.00
Created April 29, 2026 5:58 PM
Envelope v1
Signed payload
Primary matcher call_pattern
0x098b716b8aaf21512996dc57eb0615e2383e2f96 0xd505accf
Scope
galileo-testnet home sepolia
Evidence redacted public excerpt
Reasoning excerpt
EIP-2612 permit() call submitting a victim's gasless signature with the Atomic Wallet drainer as the spender. Permit-based drains are particularly damaging because the victim's wallet UI shows a signature request rather than a transaction, lowering the suspicion threshold. MALICIOUS at the highest confidence: the only reason to submit a permit naming a sanctioned-attribution drainer is to execute a drain. Severity reflects the full-balance approval semantics of permit.

Full evidence (TEE-sealed) is fetchable by holders of the unsealing key. Public mirror carries hash only.

TEE attestation
Curated by human
Heuristically published from a known threat catalog, not derived from a TEE-verified verdict.
Evidence CID
0x69eb76f07e2d87af63388fcfc18dc3f4f15d875471e05a2e2d3b26bc70342348
Network impact Live
Since publish
Cache hits
0
SDK check() matches
Agents synced
0
distinct callers
Attacks blocked
0
tx-level intercepts
Pool reverts
0
Uniswap v4 hook
USD protected
$0.00
no blocks recorded yet
Hits over time each bar is one of 30 equal slices since publish
publish now
Recent intercepts
Agent Method Chain When
No agent has had to block this antibody yet.
Intercepts appear here in real time as agents match this pattern in the wild.
Mirror status All chains synced
Chain Tx State
sepolia
0xa4e0c4f8..cbf4 active
1 of 1 chains mirrored
v2 feature

Challenge game coming soon

Challenges let anyone counter-stake on a published antibody they believe is wrong. The publisher loses their stake if a challenge succeeds; the challenger does if it fails. The on-chain mechanics are designed; the UI lands in v2.