Content pfp
Content
@
https://opensea.io/collection/evm-6
0 reply
0 recast
2 reactions

Matt Solomon pfp
Matt Solomon
@msolomon.eth
Came across https://github.com/cdump/evmole today, another tool that extracts function info from bytecode. It has some benchmarks showing its false neg/pos rate as better than whatsabi/heimdall, so I think @shazow.eth and @becker might be interested :) (I have not validated or confirmed the benchmarks)
4 replies
0 recast
14 reactions

jon becker pfp
jon becker
@becker
The heimdall benchmarks are a bit incorrect, as there is no “selector extraction” module. I’m assuming the benchmarks for heimdall performed full decompilation / cfg generation, possibly with sig resolution enabled, due to the 600s results. I may PR into evmole with updated (and reproducable) benchmarks
1 reply
0 recast
2 reactions

shazow pfp
shazow
@shazow.eth
I saw that! Looks cool, it's on my list to dig into the results closer. It definitely does more EVM emulating than I'm doing on my end (been on my list for a while). Mixed feels about the benchmarks but I don't have something better yet, so I'm grateful for anything!
1 reply
0 recast
1 reaction

Varun Srinivasan pfp
Varun Srinivasan
@v
Mole content tends to do well on farcaster, excellent choice!
1 reply
0 recast
1 reaction

Alchemyst pfp
Alchemyst
@mage
This looks neat! I am definitely going to give this a more thorough glance when not on mobile, but tentatively looks like it could be useful for mapping threats on-chain. First thoughts are somehow automate with it, find patterns of interest with uncommon sigs, then maybe query dune/flipside?
1 reply
0 recast
1 reaction