One of the contracts used during the SH attacks had the following payload:
3273d3e32594cedbc102d739142aa70d21f4caea56181415305773764d7849614e664f6646614161416153744c6255ff
Which is
[0] ORIGIN
[21] PUSH20 0xd3e32594cedbc102d739142aa70d21f4caea5618
[22] EQ
[23] ISZERO
[24] ADDRESS
[25] JUMPI
[46] PUSH20 0x764d7849614e664f6646614161416153744c6255
[47] SUICIDE
Note the implicit PUSH from ADDRESS, which, if the check fails, becomes a JUMP-location (which obviously will fail).
Running that with evmdis produces the following:
2017/02/10 14:41:21 Entering block at 0 with stack height 0
panic: Error performing reaching analysis: 25: Could not determine jump location statically; source is 24
goroutine 1 [running]:
main.main()
/home/martin/go/src/github.com/Arachnid/evmdis/evmdis/main.go:23 +0x411
One of the contracts used during the SH attacks had the following payload:
Which is
Note the implicit
PUSHfrom ADDRESS, which, if the check fails, becomes aJUMP-location (which obviously will fail).Running that with evmdis produces the following: