2026-03-09 03:28:10 +00:00
|
|
|
#!/usr/bin/env bash
|
|
|
|
|
# red-team.sh — Adversarial floor-attack agent runner.
|
|
|
|
|
#
|
|
|
|
|
# Spawns a Claude sub-agent with tools and a goal: make ethPerToken() decrease.
|
|
|
|
|
# The agent iterates freely — snapshot → strategy → check floor → revert → repeat.
|
|
|
|
|
#
|
|
|
|
|
# Usage: red-team.sh
|
|
|
|
|
#
|
|
|
|
|
# Exit codes:
|
|
|
|
|
# 0 floor held (no confirmed decrease)
|
|
|
|
|
# 1 floor broken (agent found a strategy that decreased ethPerToken)
|
|
|
|
|
# 2 infra error (stack not running, missing dependency, etc.)
|
|
|
|
|
#
|
|
|
|
|
# Environment overrides:
|
|
|
|
|
# CLAUDE_TIMEOUT seconds for the agent run (default: 7200)
|
|
|
|
|
# RPC_URL Anvil RPC endpoint (default: http://localhost:8545)
|
|
|
|
|
|
|
|
|
|
set -euo pipefail
|
|
|
|
|
|
|
|
|
|
CAST=/home/debian/.foundry/bin/cast
|
2026-03-11 02:08:06 +00:00
|
|
|
FORGE=/home/debian/.foundry/bin/forge
|
2026-03-09 03:28:10 +00:00
|
|
|
RPC_URL="${RPC_URL:-http://localhost:8545}"
|
|
|
|
|
CLAUDE_TIMEOUT="${CLAUDE_TIMEOUT:-7200}"
|
|
|
|
|
REPO_ROOT="$(cd "$(dirname "$0")/../.." && pwd)"
|
|
|
|
|
REPORT_DIR="$REPO_ROOT/tmp"
|
|
|
|
|
REPORT="$REPORT_DIR/red-team-report.txt"
|
2026-03-09 09:23:37 +00:00
|
|
|
STREAM_LOG="$REPORT_DIR/red-team-stream.jsonl"
|
2026-03-11 02:08:06 +00:00
|
|
|
MEMORY_FILE="$REPO_ROOT/tmp/red-team-memory.jsonl"
|
2026-03-15 16:30:54 +00:00
|
|
|
CROSS_PATTERNS_FILE="/tmp/red-team-cross-patterns.jsonl"
|
2026-03-11 02:08:06 +00:00
|
|
|
ATTACK_EXPORT="$REPORT_DIR/red-team-attacks.jsonl"
|
|
|
|
|
ATTACK_SNAPSHOTS="$REPORT_DIR/red-team-snapshots.jsonl"
|
2026-03-09 03:28:10 +00:00
|
|
|
DEPLOYMENTS="$REPO_ROOT/onchain/deployments-local.json"
|
|
|
|
|
|
2026-03-15 15:23:43 +00:00
|
|
|
# ── Candidate metadata (set by red-team-sweep.sh; defaults to unknown for standalone runs) ─
|
|
|
|
|
CANDIDATE_NAME="${CANDIDATE_NAME:-unknown}"
|
|
|
|
|
OPTIMIZER_PROFILE="${OPTIMIZER_PROFILE:-unknown}"
|
|
|
|
|
|
2026-03-09 03:28:10 +00:00
|
|
|
# ── Anvil accounts ─────────────────────────────────────────────────────────────
|
|
|
|
|
# Account 8 — adversary (10k ETH, 0 KRK)
|
|
|
|
|
ADV_PK=0xdbda1821b80551c9d65939329250298aa3472ba22feea921c0cf5d620ea67b97
|
2026-03-14 15:10:59 +00:00
|
|
|
# Account 2 — recenter caller (recenter is public, any account can call)
|
2026-03-09 03:28:10 +00:00
|
|
|
RECENTER_PK=0x5de4111afa1a4b94908f83103eb1f1706367c2e68ca870fc3fb9a804cdab365a
|
|
|
|
|
|
|
|
|
|
# ── Infrastructure constants ───────────────────────────────────────────────────
|
|
|
|
|
WETH=0x4200000000000000000000000000000000000006
|
2026-03-15 06:48:16 +00:00
|
|
|
# Base mainnet SwapRouter02 — https://basescan.org/address/0x2626664c2603336E57B271c5C0b26F421741e481
|
|
|
|
|
SWAP_ROUTER=0x2626664c2603336E57B271c5C0b26F421741e481
|
|
|
|
|
# Base mainnet Uniswap V3 Factory — https://basescan.org/address/0x33128a8fC17869897dcE68Ed026d694621f6FDfD
|
|
|
|
|
V3_FACTORY=0x33128a8fC17869897dcE68Ed026d694621f6FDfD
|
2026-03-14 02:22:51 +00:00
|
|
|
# Base mainnet NonfungiblePositionManager — https://basescan.org/address/0x03a520B32c04bf3beef7BEb72E919cF822Ed34F3
|
|
|
|
|
NPM=0x03a520B32c04bf3beef7BEb72E919cF822Ed34F3
|
2026-03-09 03:28:10 +00:00
|
|
|
POOL_FEE=10000
|
|
|
|
|
|
|
|
|
|
# ── Logging helpers ────────────────────────────────────────────────────────────
|
|
|
|
|
log() { echo "[red-team] $*"; }
|
|
|
|
|
die() { echo "[red-team] ERROR: $*" >&2; exit 2; }
|
|
|
|
|
|
|
|
|
|
# ── Prerequisites ──────────────────────────────────────────────────────────────
|
2026-03-11 02:08:06 +00:00
|
|
|
command -v "$CAST" &>/dev/null || die "cast not found at $CAST"
|
|
|
|
|
command -v "$FORGE" &>/dev/null || die "forge not found at $FORGE"
|
2026-03-09 03:28:10 +00:00
|
|
|
command -v claude &>/dev/null || die "claude CLI not found (install: npm i -g @anthropic-ai/claude-code)"
|
|
|
|
|
command -v python3 &>/dev/null || die "python3 not found"
|
|
|
|
|
command -v jq &>/dev/null || die "jq not found"
|
|
|
|
|
|
2026-03-13 11:55:22 +00:00
|
|
|
# ── 1. Fresh stack via bootstrap-light ─────────────────────────────────────────
|
|
|
|
|
SCRIPT_DIR="$(cd "$(dirname "$0")" && pwd)"
|
|
|
|
|
log "Running bootstrap-light ..."
|
|
|
|
|
bash "$SCRIPT_DIR/bootstrap-light.sh" || die "bootstrap-light failed"
|
2026-03-10 19:11:11 +00:00
|
|
|
|
|
|
|
|
# Verify Anvil responds
|
2026-03-09 03:28:10 +00:00
|
|
|
"$CAST" chain-id --rpc-url "$RPC_URL" >/dev/null 2>&1 \
|
2026-03-13 11:55:22 +00:00
|
|
|
|| die "Anvil not accessible at $RPC_URL after bootstrap-light"
|
2026-03-09 03:28:10 +00:00
|
|
|
|
|
|
|
|
# ── 2. Read contract addresses ─────────────────────────────────────────────────
|
|
|
|
|
[[ -f "$DEPLOYMENTS" ]] || die "deployments-local.json not found at $DEPLOYMENTS (bootstrap not complete)"
|
|
|
|
|
|
|
|
|
|
KRK=$(jq -r '.contracts.Kraiken' "$DEPLOYMENTS")
|
|
|
|
|
STAKE=$(jq -r '.contracts.Stake' "$DEPLOYMENTS")
|
|
|
|
|
LM=$(jq -r '.contracts.LiquidityManager' "$DEPLOYMENTS")
|
|
|
|
|
OPT=$(jq -r '.contracts.OptimizerProxy' "$DEPLOYMENTS")
|
|
|
|
|
|
|
|
|
|
for var in KRK STAKE LM OPT; do
|
|
|
|
|
val="${!var}"
|
|
|
|
|
[[ -n "$val" && "$val" != "null" ]] \
|
|
|
|
|
|| die "$var address missing from deployments-local.json — was bootstrap successful?"
|
|
|
|
|
done
|
|
|
|
|
|
|
|
|
|
log " KRK: $KRK"
|
|
|
|
|
log " STAKE: $STAKE"
|
|
|
|
|
log " LM: $LM"
|
|
|
|
|
log " OPT: $OPT"
|
|
|
|
|
|
|
|
|
|
# Derive Anvil account addresses from their private keys
|
|
|
|
|
ADV_ADDR=$("$CAST" wallet address --private-key "$ADV_PK")
|
|
|
|
|
RECENTER_ADDR=$("$CAST" wallet address --private-key "$RECENTER_PK")
|
|
|
|
|
log " Adversary: $ADV_ADDR (account 8)"
|
|
|
|
|
log " Recenter: $RECENTER_ADDR (account 2)"
|
|
|
|
|
|
|
|
|
|
# Get Uniswap V3 Pool address
|
|
|
|
|
POOL=$("$CAST" call "$V3_FACTORY" "getPool(address,address,uint24)(address)" \
|
2026-03-11 10:19:14 +00:00
|
|
|
"$WETH" "$KRK" "$POOL_FEE" --rpc-url "$RPC_URL" | sed 's/\[.*//;s/[[:space:]]//g')
|
2026-03-09 03:28:10 +00:00
|
|
|
log " Pool: $POOL"
|
|
|
|
|
|
2026-03-14 15:10:59 +00:00
|
|
|
# ── 3a. recenter() is now public (no recenterAccess needed) ──
|
|
|
|
|
# Any address can call recenter() — TWAP oracle enforces safety.
|
|
|
|
|
log "recenter() is public — no access grant needed"
|
2026-03-13 11:55:22 +00:00
|
|
|
|
|
|
|
|
# ── 3b. Set feeDestination to LM itself (fees accrue as liquidity) ─────────────
|
2026-03-12 16:13:44 +00:00
|
|
|
# setFeeDestination allows repeated EOA sets; setting to a contract locks it permanently.
|
|
|
|
|
# The deployer (Anvil account 0) deployed LiquidityManager and may call setFeeDestination again.
|
2026-03-12 17:13:50 +00:00
|
|
|
# DEPLOYER_PK is Anvil's deterministic account-0 key — valid ONLY against a local ephemeral
|
|
|
|
|
# Anvil instance. Never run this script against a non-ephemeral or shared-state chain.
|
2026-03-12 16:13:44 +00:00
|
|
|
DEPLOYER_PK=0xac0974bec39a17e36ba4a6b4d238ff944bacb478cbed5efcae784d7bf4f2ff80
|
2026-03-10 19:11:11 +00:00
|
|
|
log "Setting feeDestination to LM ($LM) ..."
|
2026-03-12 16:13:44 +00:00
|
|
|
"$CAST" send --rpc-url "$RPC_URL" --private-key "$DEPLOYER_PK" \
|
|
|
|
|
"$LM" "setFeeDestination(address)" "$LM" >/dev/null 2>&1 \
|
|
|
|
|
|| die "setFeeDestination($LM) failed"
|
2026-03-11 10:19:14 +00:00
|
|
|
VERIFY=$("$CAST" call "$LM" "feeDestination()(address)" --rpc-url "$RPC_URL" | sed 's/\[.*//;s/[[:space:]]//g')
|
2026-03-10 19:11:11 +00:00
|
|
|
log " feeDestination set to: $VERIFY"
|
|
|
|
|
[[ "${VERIFY,,}" == "${LM,,}" ]] || die "feeDestination verification failed: expected $LM, got $VERIFY"
|
|
|
|
|
|
2026-03-13 11:55:22 +00:00
|
|
|
# ── 3c. Fund LM with 1000 ETH and deploy into positions via recenter ───────────
|
2026-03-10 19:11:11 +00:00
|
|
|
# Send ETH as WETH (LM uses WETH internally), then recenter to deploy into positions.
|
|
|
|
|
# Without recenter, the ETH sits idle and the first recenter mints massive KRK.
|
|
|
|
|
log "Funding LM with 1000 ETH ..."
|
|
|
|
|
# Wrap to WETH and transfer to LM
|
|
|
|
|
"$CAST" send "$WETH" "deposit()" --value 1000ether \
|
|
|
|
|
--private-key "$ADV_PK" --rpc-url "$RPC_URL" >/dev/null 2>&1 \
|
|
|
|
|
|| die "Failed to wrap ETH"
|
|
|
|
|
"$CAST" send "$WETH" "transfer(address,uint256)" "$LM" 1000000000000000000000 \
|
|
|
|
|
--private-key "$ADV_PK" --rpc-url "$RPC_URL" >/dev/null 2>&1 \
|
|
|
|
|
|| die "Failed to transfer WETH to LM"
|
|
|
|
|
|
|
|
|
|
# Recenter to deploy the new WETH into positions (establishes realistic baseline)
|
|
|
|
|
log "Recentering to deploy funded WETH into positions ..."
|
|
|
|
|
"$CAST" send "$LM" "recenter()" \
|
|
|
|
|
--private-key "$RECENTER_PK" --rpc-url "$RPC_URL" >/dev/null 2>&1 \
|
|
|
|
|
|| log " WARNING: initial recenter failed (may need amplitude — mining blocks)"
|
2026-03-15 10:47:36 +00:00
|
|
|
# Advance time and mine blocks, then retry recenter
|
2026-03-10 19:11:11 +00:00
|
|
|
for _i in $(seq 1 3); do
|
2026-03-15 10:47:36 +00:00
|
|
|
"$CAST" rpc evm_increaseTime 600 --rpc-url "$RPC_URL" >/dev/null 2>&1
|
2026-03-10 19:11:11 +00:00
|
|
|
for _b in $(seq 1 50); do
|
|
|
|
|
"$CAST" rpc evm_mine --rpc-url "$RPC_URL" >/dev/null 2>&1
|
|
|
|
|
done
|
|
|
|
|
"$CAST" send "$LM" "recenter()" \
|
|
|
|
|
--private-key "$RECENTER_PK" --rpc-url "$RPC_URL" >/dev/null 2>&1 && break
|
|
|
|
|
done
|
|
|
|
|
|
|
|
|
|
LM_ETH=$("$CAST" balance "$LM" --rpc-url "$RPC_URL" | sed 's/\[.*//;s/[[:space:]]//g')
|
|
|
|
|
LM_WETH=$("$CAST" call "$WETH" "balanceOf(address)(uint256)" "$LM" --rpc-url "$RPC_URL" | sed 's/\[.*//;s/[[:space:]]//g')
|
|
|
|
|
log " LM after recenter: ETH=$LM_ETH WETH=$LM_WETH"
|
|
|
|
|
|
2026-03-14 15:10:59 +00:00
|
|
|
# ── 4. Take Anvil snapshot (clean baseline) ─────
|
2026-03-09 03:28:10 +00:00
|
|
|
log "Taking Anvil snapshot..."
|
|
|
|
|
SNAP=$("$CAST" rpc anvil_snapshot --rpc-url "$RPC_URL" | tr -d '"')
|
|
|
|
|
log " Snapshot ID: $SNAP"
|
|
|
|
|
|
2026-03-09 03:59:12 +00:00
|
|
|
# Revert to the baseline snapshot on exit so subsequent runs start clean.
|
2026-03-13 09:48:34 +00:00
|
|
|
CLAUDE_PID=""
|
2026-03-09 03:59:12 +00:00
|
|
|
cleanup() {
|
|
|
|
|
local rc=$?
|
2026-03-13 09:48:34 +00:00
|
|
|
if [[ -n "${CLAUDE_PID:-}" ]]; then
|
|
|
|
|
kill "$CLAUDE_PID" 2>/dev/null || true
|
|
|
|
|
fi
|
2026-03-09 03:59:12 +00:00
|
|
|
if [[ -n "${SNAP:-}" ]]; then
|
|
|
|
|
"$CAST" rpc anvil_revert "$SNAP" --rpc-url "$RPC_URL" >/dev/null 2>&1 || true
|
|
|
|
|
fi
|
|
|
|
|
exit $rc
|
|
|
|
|
}
|
|
|
|
|
trap cleanup EXIT INT TERM
|
2026-03-09 03:28:10 +00:00
|
|
|
|
2026-03-10 19:11:11 +00:00
|
|
|
# ── Helper: compute total ETH controlled by LM ────────────────────────────────
|
|
|
|
|
# Total = free ETH + free WETH + ETH locked in all 3 Uni V3 positions
|
|
|
|
|
# This is the real metric: "can the adversary extract ETH from the protocol?"
|
|
|
|
|
# Uses a forge script with exact Uni V3 integer math (LiquidityAmounts + TickMath)
|
|
|
|
|
# instead of multiple cast calls + Python float approximation.
|
|
|
|
|
compute_lm_total_eth() {
|
2026-03-10 20:01:12 +00:00
|
|
|
local output result
|
2026-03-13 11:55:22 +00:00
|
|
|
output=$(cd "$REPO_ROOT" && LM="$LM" WETH="$WETH" POOL="$POOL" \
|
|
|
|
|
"$FORGE" script onchain/script/LmTotalEth.s.sol \
|
|
|
|
|
--rpc-url "$RPC_URL" --root onchain 2>&1)
|
2026-03-10 19:11:11 +00:00
|
|
|
# forge script prints "== Logs ==" then " <value>" — extract the number
|
2026-03-10 20:01:12 +00:00
|
|
|
result=$(echo "$output" | awk '/^== Logs ==/{getline; gsub(/^[[:space:]]+/,""); print; exit}')
|
|
|
|
|
[[ -n "$result" && "$result" =~ ^[0-9]+$ ]] || die "Failed to read LM total ETH (forge output: $output)"
|
|
|
|
|
echo "$result"
|
2026-03-09 03:28:10 +00:00
|
|
|
}
|
|
|
|
|
|
2026-03-09 09:23:37 +00:00
|
|
|
# ── Helper: extract strategy findings from stream-json and append to memory ────
|
|
|
|
|
extract_memory() {
|
|
|
|
|
local stream_file="$1"
|
|
|
|
|
local run_num memory_file="$MEMORY_FILE"
|
|
|
|
|
|
2026-03-15 15:54:01 +00:00
|
|
|
# Determine run number: use max run in file + 1 so it stays monotonic after trim
|
2026-03-09 09:23:37 +00:00
|
|
|
if [[ -f "$memory_file" ]]; then
|
2026-03-15 15:54:01 +00:00
|
|
|
run_num=$(python3 - "$memory_file" <<'EOF'
|
|
|
|
|
import json, sys
|
|
|
|
|
entries = [json.loads(l) for l in open(sys.argv[1]) if l.strip()]
|
|
|
|
|
print(max((e.get('run', 0) for e in entries), default=0) + 1)
|
|
|
|
|
EOF
|
|
|
|
|
)
|
|
|
|
|
[[ "$run_num" =~ ^[0-9]+$ ]] || run_num=1
|
2026-03-09 09:23:37 +00:00
|
|
|
else
|
|
|
|
|
run_num=1
|
|
|
|
|
fi
|
|
|
|
|
|
2026-03-15 15:23:43 +00:00
|
|
|
python3 - "$stream_file" "$memory_file" "$run_num" "$LM_ETH_BEFORE" "$CANDIDATE_NAME" "$OPTIMIZER_PROFILE" <<'PYEOF'
|
2026-03-09 09:23:37 +00:00
|
|
|
import json, sys, re
|
|
|
|
|
from datetime import datetime, timezone
|
|
|
|
|
|
|
|
|
|
stream_file = sys.argv[1]
|
|
|
|
|
memory_file = sys.argv[2]
|
|
|
|
|
run_num = int(sys.argv[3])
|
2026-03-09 10:00:56 +00:00
|
|
|
try:
|
2026-03-10 19:11:11 +00:00
|
|
|
lm_eth_before = int(sys.argv[4])
|
2026-03-09 10:00:56 +00:00
|
|
|
except (ValueError, IndexError):
|
2026-03-10 19:11:11 +00:00
|
|
|
print(" extract_memory: invalid lm_eth_before value, skipping", file=sys.stderr)
|
2026-03-09 10:00:56 +00:00
|
|
|
sys.exit(0)
|
2026-03-15 15:23:43 +00:00
|
|
|
candidate = sys.argv[5] if len(sys.argv) > 5 else "unknown"
|
|
|
|
|
optimizer_profile = sys.argv[6] if len(sys.argv) > 6 else "unknown"
|
|
|
|
|
|
|
|
|
|
def make_pattern(strategy_name, steps_text):
|
2026-03-15 15:54:01 +00:00
|
|
|
"""Extract abstract op sequence preserving execution order."""
|
2026-03-15 15:23:43 +00:00
|
|
|
text = (strategy_name + " " + steps_text).lower()
|
2026-03-15 15:54:01 +00:00
|
|
|
op_positions = []
|
|
|
|
|
|
|
|
|
|
for kw, label in [("wrap", "wrap"), ("buy", "buy"), ("sell", "sell")]:
|
|
|
|
|
m = re.search(r'\b' + kw + r'\b', text)
|
|
|
|
|
if m:
|
|
|
|
|
op_positions.append((m.start(), label))
|
|
|
|
|
|
|
|
|
|
# Use word boundaries so 'stake' never matches inside 'unstake'
|
|
|
|
|
m_stake = re.search(r'\bstake\b', text)
|
|
|
|
|
if m_stake:
|
|
|
|
|
ctx = text[max(0, m_stake.start() - 10):m_stake.start() + 20]
|
|
|
|
|
op_positions.append((m_stake.start(), "stake_all" if "all" in ctx else "stake"))
|
|
|
|
|
|
|
|
|
|
m_unstake = re.search(r'\bunstake\b', text)
|
|
|
|
|
if m_unstake:
|
|
|
|
|
op_positions.append((m_unstake.start(), "unstake"))
|
|
|
|
|
|
|
|
|
|
recenter_matches = list(re.finditer(r'\brecenter\b', text))
|
|
|
|
|
if recenter_matches:
|
|
|
|
|
label = "recenter" if len(recenter_matches) == 1 else "recenter_multi"
|
|
|
|
|
op_positions.append((recenter_matches[0].start(), label))
|
|
|
|
|
|
|
|
|
|
# add_lp: keyword or mint + LP context
|
|
|
|
|
m = re.search(r'\badd_lp\b', text)
|
|
|
|
|
if m:
|
|
|
|
|
op_positions.append((m.start(), "add_lp"))
|
|
|
|
|
elif re.search(r'\bmint\b', text) and ("lp" in text or "liquidity" in text):
|
|
|
|
|
m = re.search(r'\bmint\b', text)
|
|
|
|
|
op_positions.append((m.start(), "add_lp"))
|
|
|
|
|
|
|
|
|
|
# remove_lp: keyword or decreaseliquidity
|
|
|
|
|
for pat in [r'\bremove_lp\b', r'\bdecreaseliquidity\b']:
|
|
|
|
|
m = re.search(pat, text)
|
|
|
|
|
if m:
|
|
|
|
|
op_positions.append((m.start(), "remove_lp"))
|
|
|
|
|
break
|
|
|
|
|
|
|
|
|
|
# Sort by first occurrence position to reflect actual execution order
|
|
|
|
|
op_positions.sort(key=lambda x: x[0])
|
|
|
|
|
seen = set()
|
2026-03-15 15:23:43 +00:00
|
|
|
ops = []
|
2026-03-15 15:54:01 +00:00
|
|
|
for _, label in op_positions:
|
|
|
|
|
if label not in seen:
|
|
|
|
|
seen.add(label)
|
|
|
|
|
ops.append(label)
|
2026-03-15 15:23:43 +00:00
|
|
|
return " → ".join(ops) if ops else strategy_name[:60]
|
2026-03-09 09:23:37 +00:00
|
|
|
|
|
|
|
|
texts = []
|
|
|
|
|
with open(stream_file) as f:
|
|
|
|
|
for line in f:
|
|
|
|
|
line = line.strip()
|
|
|
|
|
if not line:
|
|
|
|
|
continue
|
|
|
|
|
try:
|
|
|
|
|
obj = json.loads(line)
|
|
|
|
|
if obj.get("type") == "assistant":
|
|
|
|
|
for block in obj.get("message", {}).get("content", []):
|
|
|
|
|
if block.get("type") == "text":
|
|
|
|
|
texts.append(block["text"])
|
|
|
|
|
except:
|
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
|
# Parse strategies from agent text
|
|
|
|
|
strategies = []
|
|
|
|
|
current = None
|
|
|
|
|
for text in texts:
|
2026-03-09 10:00:56 +00:00
|
|
|
# Detect strategy headers: matches "## Strategy 1: name" and "STRATEGY 1: name"
|
|
|
|
|
strat_match = re.search(r"(?:##\s*)?[Ss][Tt][Rr][Aa][Tt][Ee][Gg][Yy]\s*\d+[^:]*:\s*(.+)", text)
|
2026-03-09 09:23:37 +00:00
|
|
|
if strat_match:
|
|
|
|
|
if current:
|
|
|
|
|
strategies.append(current)
|
|
|
|
|
current = {
|
|
|
|
|
"strategy": strat_match.group(1).strip(),
|
|
|
|
|
"steps": "",
|
2026-03-10 19:11:11 +00:00
|
|
|
"lm_eth_after": None,
|
2026-03-15 15:54:01 +00:00
|
|
|
"insight": "",
|
|
|
|
|
"insight_pri": 999 # tracks priority of stored insight; lower index wins
|
2026-03-09 09:23:37 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if current:
|
2026-03-09 10:00:56 +00:00
|
|
|
# Capture floor readings — take the last match in the block (most recent value)
|
2026-03-10 20:01:12 +00:00
|
|
|
floor_matches = list(re.finditer(r"(?:floor|ethPerToken|lm.?eth)[^\d]*?(\d{4,})\s*(?:wei)?", text, re.IGNORECASE))
|
2026-03-09 10:00:56 +00:00
|
|
|
if floor_matches:
|
2026-03-10 19:11:11 +00:00
|
|
|
current["lm_eth_after"] = int(floor_matches[-1].group(1))
|
2026-03-09 09:23:37 +00:00
|
|
|
|
2026-03-15 15:54:01 +00:00
|
|
|
# Capture insights — prefer explicit labels; only overwrite if new match is higher priority
|
|
|
|
|
for pri, ins_pat in enumerate([
|
2026-03-15 15:23:43 +00:00
|
|
|
r"[Kk]ey [Ii]nsight:\s*(.+)",
|
|
|
|
|
r"[Ii]nsight:\s*(.+)",
|
|
|
|
|
r"[Ww][Hh][Yy][^:]*:\s*(.{30,})",
|
|
|
|
|
r"(?:because|since|due to)\s+(.{30,})",
|
|
|
|
|
r"(?:discovered|learned|realized)\s+(?:that\s+)?(.+)"
|
2026-03-15 15:54:01 +00:00
|
|
|
]):
|
|
|
|
|
if pri >= current["insight_pri"]:
|
|
|
|
|
break # already have a higher-priority insight stored
|
2026-03-15 15:23:43 +00:00
|
|
|
insight_match = re.search(ins_pat, text)
|
2026-03-09 09:23:37 +00:00
|
|
|
if insight_match and len(insight_match.group(1)) > 20:
|
|
|
|
|
current["insight"] = insight_match.group(1).strip()[:300]
|
2026-03-15 15:54:01 +00:00
|
|
|
current["insight_pri"] = pri
|
2026-03-15 15:23:43 +00:00
|
|
|
break
|
2026-03-09 09:23:37 +00:00
|
|
|
|
|
|
|
|
# Capture step summaries
|
|
|
|
|
if any(word in text.lower() for word in ["wrap", "buy", "sell", "stake", "recenter", "mint", "approve"]):
|
|
|
|
|
if len(text) < 200:
|
|
|
|
|
current["steps"] += text.strip() + "; "
|
|
|
|
|
|
|
|
|
|
if current:
|
|
|
|
|
strategies.append(current)
|
|
|
|
|
|
|
|
|
|
# Write to memory file
|
|
|
|
|
ts = datetime.now(timezone.utc).isoformat()
|
|
|
|
|
with open(memory_file, "a") as f:
|
|
|
|
|
for s in strategies:
|
2026-03-10 19:11:11 +00:00
|
|
|
fa = s["lm_eth_after"] if s.get("lm_eth_after") is not None else lm_eth_before
|
|
|
|
|
delta_bps = round((fa - lm_eth_before) * 10000 / lm_eth_before) if lm_eth_before else 0
|
|
|
|
|
if fa < lm_eth_before:
|
2026-03-09 09:23:37 +00:00
|
|
|
result = "DECREASED"
|
2026-03-10 19:11:11 +00:00
|
|
|
elif fa > lm_eth_before:
|
2026-03-09 09:23:37 +00:00
|
|
|
result = "INCREASED"
|
|
|
|
|
else:
|
|
|
|
|
result = "HELD"
|
|
|
|
|
|
2026-03-15 15:23:43 +00:00
|
|
|
pattern = make_pattern(s["strategy"], s["steps"])
|
2026-03-09 09:23:37 +00:00
|
|
|
entry = {
|
|
|
|
|
"run": run_num,
|
|
|
|
|
"ts": ts,
|
2026-03-15 15:23:43 +00:00
|
|
|
"candidate": candidate,
|
|
|
|
|
"optimizer_profile": optimizer_profile,
|
2026-03-09 09:23:37 +00:00
|
|
|
"strategy": s["strategy"][:100],
|
2026-03-15 15:23:43 +00:00
|
|
|
"pattern": pattern[:150],
|
2026-03-09 09:23:37 +00:00
|
|
|
"steps": s["steps"][:300].rstrip("; "),
|
2026-03-10 19:11:11 +00:00
|
|
|
"lm_eth_before": lm_eth_before,
|
|
|
|
|
"lm_eth_after": fa,
|
2026-03-09 09:23:37 +00:00
|
|
|
"delta_bps": delta_bps,
|
|
|
|
|
"result": result,
|
|
|
|
|
"insight": s["insight"][:300]
|
|
|
|
|
}
|
|
|
|
|
f.write(json.dumps(entry) + "\n")
|
2026-03-15 15:23:43 +00:00
|
|
|
print(f" Recorded: {entry['strategy']} [{entry['candidate']}] → {result} ({delta_bps:+d} bps)")
|
2026-03-09 09:23:37 +00:00
|
|
|
|
|
|
|
|
if not strategies:
|
|
|
|
|
print(" No strategies detected in stream output")
|
|
|
|
|
|
|
|
|
|
# Trim memory file: keep 10 most recent + all DECREASED entries (cap at 50)
|
|
|
|
|
with open(memory_file) as f:
|
|
|
|
|
all_entries = [json.loads(l) for l in f if l.strip()]
|
|
|
|
|
|
|
|
|
|
if len(all_entries) > 50:
|
2026-03-09 10:00:56 +00:00
|
|
|
# Keep all DECREASED entries + 10 most recent; deduplicate preserving order
|
2026-03-09 09:23:37 +00:00
|
|
|
trimmed = [e for e in all_entries if e.get("result") == "DECREASED"] + all_entries[-10:]
|
|
|
|
|
seen = set()
|
|
|
|
|
deduped = []
|
|
|
|
|
for e in trimmed:
|
|
|
|
|
key = (e.get("run"), e.get("ts"), e.get("strategy"))
|
|
|
|
|
if key not in seen:
|
|
|
|
|
seen.add(key)
|
|
|
|
|
deduped.append(e)
|
|
|
|
|
with open(memory_file, "w") as f:
|
|
|
|
|
for e in deduped:
|
|
|
|
|
f.write(json.dumps(e) + "\n")
|
|
|
|
|
print(f" Trimmed memory to {len(deduped)} entries")
|
|
|
|
|
PYEOF
|
|
|
|
|
}
|
|
|
|
|
|
2026-03-10 19:11:11 +00:00
|
|
|
# ── 5. Read lm_eth_before ───────────────────────────────────────────────────────
|
2026-03-09 03:28:10 +00:00
|
|
|
log "Reading floor before agent run..."
|
2026-03-10 19:11:11 +00:00
|
|
|
LM_ETH_BEFORE=$(compute_lm_total_eth)
|
|
|
|
|
log " lm_eth_before = $LM_ETH_BEFORE wei"
|
2026-03-09 03:28:10 +00:00
|
|
|
|
|
|
|
|
# ── 6. Build agent prompt ──────────────────────────────────────────────────────
|
2026-03-09 09:23:37 +00:00
|
|
|
|
2026-03-15 14:18:10 +00:00
|
|
|
# ── 6a. Read Solidity source files (reflect the current candidate after inject) ─
|
|
|
|
|
ONCHAIN_SRC="$REPO_ROOT/onchain/src"
|
|
|
|
|
SOL_LM=$(< "$ONCHAIN_SRC/LiquidityManager.sol")
|
|
|
|
|
SOL_THREE_POS=$(< "$ONCHAIN_SRC/abstracts/ThreePositionStrategy.sol")
|
|
|
|
|
SOL_OPTIMIZER=$(< "$ONCHAIN_SRC/Optimizer.sol")
|
|
|
|
|
SOL_OPTIMIZERV3=$(< "$ONCHAIN_SRC/OptimizerV3.sol")
|
|
|
|
|
SOL_VWAP=$(< "$ONCHAIN_SRC/VWAPTracker.sol")
|
|
|
|
|
SOL_PRICE_ORACLE=$(< "$ONCHAIN_SRC/abstracts/PriceOracle.sol")
|
|
|
|
|
|
2026-03-09 09:23:37 +00:00
|
|
|
# Build Previous Findings section from memory file
|
|
|
|
|
MEMORY_SECTION=""
|
|
|
|
|
if [[ -f "$MEMORY_FILE" && -s "$MEMORY_FILE" ]]; then
|
2026-03-09 10:00:56 +00:00
|
|
|
MEMORY_SECTION=$(python3 - "$MEMORY_FILE" <<'PYEOF'
|
2026-03-09 09:23:37 +00:00
|
|
|
import json, sys
|
2026-03-15 15:23:43 +00:00
|
|
|
from collections import defaultdict
|
2026-03-09 09:23:37 +00:00
|
|
|
entries = []
|
2026-03-09 10:00:56 +00:00
|
|
|
with open(sys.argv[1]) as f:
|
2026-03-09 09:23:37 +00:00
|
|
|
for line in f:
|
|
|
|
|
line = line.strip()
|
|
|
|
|
if line:
|
|
|
|
|
entries.append(json.loads(line))
|
|
|
|
|
if not entries:
|
|
|
|
|
sys.exit(0)
|
|
|
|
|
print('## Previous Findings (from earlier runs)')
|
|
|
|
|
print()
|
|
|
|
|
print('DO NOT repeat strategies marked HELD or INCREASED. Build on the insights.')
|
2026-03-15 15:23:43 +00:00
|
|
|
print('Distinguish optimizer-specific vulnerabilities from universal patterns.')
|
2026-03-09 09:23:37 +00:00
|
|
|
print('Try NEW combinations not yet attempted. Combine tools creatively.')
|
|
|
|
|
print()
|
2026-03-15 15:23:43 +00:00
|
|
|
|
|
|
|
|
# Cross-candidate: patterns that DECREASED in multiple distinct candidates
|
|
|
|
|
decreased = [e for e in entries if e.get('result') == 'DECREASED']
|
|
|
|
|
cross = defaultdict(set)
|
|
|
|
|
for e in decreased:
|
|
|
|
|
key = e.get('pattern') or e.get('strategy', '')
|
|
|
|
|
cross[key].add(e.get('candidate', 'unknown'))
|
|
|
|
|
universal = [(p, cands) for p, cands in cross.items() if len(cands) > 1]
|
|
|
|
|
if universal:
|
|
|
|
|
print('### Universal Patterns (succeeded across multiple candidates)')
|
|
|
|
|
for pat, cands in universal:
|
|
|
|
|
print(f"- **{pat}** — worked on: {', '.join(sorted(cands))}")
|
|
|
|
|
print()
|
|
|
|
|
|
|
|
|
|
# Group remaining entries by candidate
|
|
|
|
|
by_candidate = defaultdict(list)
|
2026-03-09 09:23:37 +00:00
|
|
|
for e in entries:
|
2026-03-15 15:23:43 +00:00
|
|
|
by_candidate[e.get('candidate', 'unknown')].append(e)
|
|
|
|
|
|
|
|
|
|
for cand, cand_entries in sorted(by_candidate.items()):
|
|
|
|
|
prof = next((e.get('optimizer_profile', '') for e in cand_entries
|
|
|
|
|
if e.get('optimizer_profile', '') not in ('', 'unknown')), '')
|
|
|
|
|
print(f"### Candidate: {cand}")
|
|
|
|
|
if prof:
|
|
|
|
|
print(f"Profile: {prof}")
|
2026-03-09 09:23:37 +00:00
|
|
|
print()
|
2026-03-15 15:23:43 +00:00
|
|
|
for e in cand_entries:
|
|
|
|
|
r = e.get('result', '?')
|
|
|
|
|
emoji = '❌' if r == 'DECREASED' else '⬆️' if r == 'INCREASED' else '➡️'
|
|
|
|
|
pat = e.get('pattern', '')
|
|
|
|
|
print(f"#### Run {e.get('run','?')}: {e.get('strategy','?')} {emoji} {r}")
|
|
|
|
|
if pat:
|
|
|
|
|
print(f"Pattern: `{pat}`")
|
|
|
|
|
print(f"Steps: {e.get('steps','?')}")
|
|
|
|
|
print(f"Delta: {e.get('delta_bps',0)} bps")
|
|
|
|
|
if e.get('insight'):
|
|
|
|
|
print(f"**Insight:** {e['insight']}")
|
|
|
|
|
print()
|
2026-03-09 10:00:56 +00:00
|
|
|
PYEOF
|
|
|
|
|
)
|
2026-03-09 09:23:37 +00:00
|
|
|
fi
|
|
|
|
|
|
2026-03-15 16:30:54 +00:00
|
|
|
# Build Cross-Candidate Intelligence section from the cross-patterns file
|
|
|
|
|
CROSS_CANDIDATE_SECTION=""
|
|
|
|
|
if [[ -f "$CROSS_PATTERNS_FILE" && -s "$CROSS_PATTERNS_FILE" ]]; then
|
|
|
|
|
CROSS_CANDIDATE_SECTION=$(python3 - "$CROSS_PATTERNS_FILE" "$CANDIDATE_NAME" <<'PYEOF'
|
|
|
|
|
import json, sys
|
|
|
|
|
from collections import defaultdict
|
|
|
|
|
|
|
|
|
|
cross_file = sys.argv[1]
|
|
|
|
|
current_candidate = sys.argv[2] if len(sys.argv) > 2 else ""
|
|
|
|
|
|
|
|
|
|
entries = []
|
|
|
|
|
with open(cross_file) as f:
|
|
|
|
|
for line in f:
|
|
|
|
|
line = line.strip()
|
|
|
|
|
if line:
|
|
|
|
|
try:
|
|
|
|
|
entries.append(json.loads(line))
|
|
|
|
|
except Exception:
|
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
|
if not entries:
|
|
|
|
|
sys.exit(0)
|
|
|
|
|
|
2026-03-15 17:02:19 +00:00
|
|
|
# Exclude entries from the current candidate (they are cross-candidate evidence, not self-evidence)
|
|
|
|
|
entries = [e for e in entries if e.get("candidate", "unknown") != current_candidate]
|
|
|
|
|
|
2026-03-15 16:30:54 +00:00
|
|
|
# Group by abstract pattern; track worked/failed per candidate
|
|
|
|
|
by_pattern = defaultdict(lambda: {"worked": {}, "failed": {}, "insight": ""})
|
|
|
|
|
for e in entries:
|
|
|
|
|
pat = e.get("pattern", "") or e.get("strategy", "")[:80]
|
2026-03-15 17:02:19 +00:00
|
|
|
if not pat:
|
|
|
|
|
continue # skip entries with no identifiable pattern
|
2026-03-15 16:30:54 +00:00
|
|
|
cand = e.get("candidate", "unknown")
|
|
|
|
|
prof = e.get("optimizer_profile", "unknown")
|
|
|
|
|
result = e.get("result", "HELD")
|
|
|
|
|
insight = e.get("insight", "")
|
|
|
|
|
if result == "DECREASED":
|
|
|
|
|
by_pattern[pat]["worked"][cand] = prof
|
|
|
|
|
else:
|
|
|
|
|
by_pattern[pat]["failed"][cand] = prof
|
|
|
|
|
if insight and not by_pattern[pat]["insight"]:
|
|
|
|
|
by_pattern[pat]["insight"] = insight
|
|
|
|
|
|
|
|
|
|
universal = [(p, d) for p, d in by_pattern.items() if len(d["worked"]) > 1]
|
|
|
|
|
candidate_specific = [(p, d) for p, d in by_pattern.items() if len(d["worked"]) == 1]
|
|
|
|
|
failed_all = [(p, d) for p, d in by_pattern.items() if not d["worked"] and d["failed"]]
|
|
|
|
|
|
|
|
|
|
print("## Cross-Candidate Intelligence")
|
|
|
|
|
print()
|
|
|
|
|
print("Attack patterns learned across all previously tested candidates.")
|
|
|
|
|
print("Exploit successes. Avoid repeating patterns that universally failed.")
|
|
|
|
|
print()
|
|
|
|
|
|
|
|
|
|
def fmt_cand(cand, prof):
|
|
|
|
|
return f"{cand} ({prof})" if prof and prof not in ("", "unknown") else cand
|
|
|
|
|
|
|
|
|
|
if universal:
|
|
|
|
|
print("### Universal Patterns (succeeded on 2+ candidates)")
|
|
|
|
|
for pat, d in sorted(universal, key=lambda x: -len(x[1]["worked"])):
|
|
|
|
|
worked_str = ", ".join(fmt_cand(c, p) for c, p in sorted(d["worked"].items()))
|
|
|
|
|
print(f"- `{pat}` — **BROKE** on: {worked_str}")
|
|
|
|
|
if d["failed"]:
|
|
|
|
|
failed_str = ", ".join(d["failed"])
|
|
|
|
|
print(f" Held on: {failed_str}")
|
|
|
|
|
if d["insight"]:
|
|
|
|
|
print(f" Insight: {d['insight']}")
|
|
|
|
|
print()
|
|
|
|
|
|
|
|
|
|
if candidate_specific:
|
|
|
|
|
print("### Candidate-Specific Patterns (broke exactly one candidate)")
|
|
|
|
|
for pat, d in candidate_specific:
|
|
|
|
|
worked_cand, worked_prof = next(iter(d["worked"].items()))
|
|
|
|
|
print(f"- `{pat}` — **BROKE** on: {fmt_cand(worked_cand, worked_prof)}")
|
|
|
|
|
if d["failed"]:
|
|
|
|
|
print(f" Held on: {', '.join(d['failed'])}")
|
|
|
|
|
if d["insight"]:
|
|
|
|
|
print(f" Insight: {d['insight']}")
|
|
|
|
|
print()
|
|
|
|
|
|
|
|
|
|
if failed_all:
|
|
|
|
|
print("### Patterns That Held Across All Candidates Tried")
|
|
|
|
|
for pat, d in failed_all:
|
|
|
|
|
print(f"- `{pat}` — held on: {', '.join(d['failed'])}")
|
|
|
|
|
print()
|
|
|
|
|
PYEOF
|
|
|
|
|
)
|
|
|
|
|
fi
|
|
|
|
|
|
2026-03-15 17:54:33 +00:00
|
|
|
PROMPT=$(cat "$SCRIPT_DIR/red-team-program.md")
|
|
|
|
|
PROMPT=${PROMPT//\{\{LM_ETH_BEFORE\}\}/$LM_ETH_BEFORE}
|
|
|
|
|
PROMPT=${PROMPT//\{\{CANDIDATE_NAME\}\}/$CANDIDATE_NAME}
|
|
|
|
|
PROMPT=${PROMPT//\{\{OPTIMIZER_PROFILE\}\}/$OPTIMIZER_PROFILE}
|
|
|
|
|
PROMPT=${PROMPT//\{\{KRK\}\}/$KRK}
|
|
|
|
|
PROMPT=${PROMPT//\{\{STAKE\}\}/$STAKE}
|
|
|
|
|
PROMPT=${PROMPT//\{\{LM\}\}/$LM}
|
|
|
|
|
PROMPT=${PROMPT//\{\{OPT\}\}/$OPT}
|
|
|
|
|
PROMPT=${PROMPT//\{\{POOL\}\}/$POOL}
|
|
|
|
|
PROMPT=${PROMPT//\{\{NPM\}\}/$NPM}
|
|
|
|
|
PROMPT=${PROMPT//\{\{WETH\}\}/$WETH}
|
|
|
|
|
PROMPT=${PROMPT//\{\{SWAP_ROUTER\}\}/$SWAP_ROUTER}
|
|
|
|
|
PROMPT=${PROMPT//\{\{ADV_ADDR\}\}/$ADV_ADDR}
|
|
|
|
|
PROMPT=${PROMPT//\{\{ADV_PK\}\}/$ADV_PK}
|
|
|
|
|
PROMPT=${PROMPT//\{\{RECENTER_ADDR\}\}/$RECENTER_ADDR}
|
|
|
|
|
PROMPT=${PROMPT//\{\{RECENTER_PK\}\}/$RECENTER_PK}
|
|
|
|
|
PROMPT=${PROMPT//\{\{POOL_FEE\}\}/$POOL_FEE}
|
|
|
|
|
PROMPT=${PROMPT//\{\{SOL_LM\}\}/$SOL_LM}
|
|
|
|
|
PROMPT=${PROMPT//\{\{SOL_THREE_POS\}\}/$SOL_THREE_POS}
|
|
|
|
|
PROMPT=${PROMPT//\{\{SOL_OPTIMIZER\}\}/$SOL_OPTIMIZER}
|
|
|
|
|
PROMPT=${PROMPT//\{\{SOL_OPTIMIZERV3\}\}/$SOL_OPTIMIZERV3}
|
|
|
|
|
PROMPT=${PROMPT//\{\{SOL_VWAP\}\}/$SOL_VWAP}
|
|
|
|
|
PROMPT=${PROMPT//\{\{SOL_PRICE_ORACLE\}\}/$SOL_PRICE_ORACLE}
|
|
|
|
|
PROMPT=${PROMPT//\{\{CROSS_CANDIDATE_SECTION\}\}/$CROSS_CANDIDATE_SECTION}
|
|
|
|
|
PROMPT=${PROMPT//\{\{MEMORY_SECTION\}\}/$MEMORY_SECTION}
|
2026-03-09 03:28:10 +00:00
|
|
|
|
|
|
|
|
# ── 7. Create output directory and run the agent ───────────────────────────────
|
|
|
|
|
mkdir -p "$REPORT_DIR"
|
|
|
|
|
|
|
|
|
|
log "Spawning Claude red-team agent (timeout: ${CLAUDE_TIMEOUT}s)..."
|
|
|
|
|
log " Report will be written to: $REPORT"
|
|
|
|
|
|
|
|
|
|
set +e
|
2026-03-09 10:00:56 +00:00
|
|
|
# Note: --verbose is required by the claude CLI when --output-format stream-json is used;
|
|
|
|
|
# omitting it causes the CLI to exit with an error, producing an empty stream log.
|
2026-03-09 03:59:12 +00:00
|
|
|
timeout "$CLAUDE_TIMEOUT" claude -p --dangerously-skip-permissions \
|
2026-03-09 09:23:37 +00:00
|
|
|
--verbose --output-format stream-json \
|
2026-03-13 09:48:34 +00:00
|
|
|
"$PROMPT" >"$STREAM_LOG" 2>&1 &
|
|
|
|
|
CLAUDE_PID=$!
|
|
|
|
|
wait "$CLAUDE_PID"
|
2026-03-09 03:28:10 +00:00
|
|
|
AGENT_EXIT=$?
|
2026-03-13 09:48:34 +00:00
|
|
|
CLAUDE_PID=""
|
2026-03-09 03:28:10 +00:00
|
|
|
set -e
|
|
|
|
|
|
|
|
|
|
if [[ $AGENT_EXIT -ne 0 ]]; then
|
2026-03-09 09:23:37 +00:00
|
|
|
log "WARNING: claude exited with code $AGENT_EXIT — see $STREAM_LOG for details"
|
2026-03-09 03:28:10 +00:00
|
|
|
fi
|
|
|
|
|
|
2026-03-09 09:23:37 +00:00
|
|
|
# Extract readable text from stream-json for the report
|
|
|
|
|
python3 - "$STREAM_LOG" >"$REPORT" <<'PYEOF'
|
|
|
|
|
import json, sys
|
|
|
|
|
with open(sys.argv[1]) as f:
|
|
|
|
|
for line in f:
|
|
|
|
|
line = line.strip()
|
|
|
|
|
if not line:
|
|
|
|
|
continue
|
|
|
|
|
try:
|
|
|
|
|
obj = json.loads(line)
|
|
|
|
|
if obj.get("type") == "assistant":
|
|
|
|
|
for block in obj.get("message", {}).get("content", []):
|
|
|
|
|
if block.get("type") == "text":
|
|
|
|
|
print(block["text"], end="")
|
|
|
|
|
except:
|
|
|
|
|
pass
|
|
|
|
|
PYEOF
|
|
|
|
|
|
2026-03-09 10:00:56 +00:00
|
|
|
# If the agent crashed and produced no readable output, treat as an infra error
|
2026-03-10 19:11:11 +00:00
|
|
|
# rather than silently reporting ETH SAFE (a false pass).
|
2026-03-09 10:00:56 +00:00
|
|
|
if [[ $AGENT_EXIT -ne 0 && ! -s "$REPORT" ]]; then
|
|
|
|
|
die "claude agent failed (exit $AGENT_EXIT) with no readable output — see $STREAM_LOG"
|
|
|
|
|
fi
|
|
|
|
|
|
2026-03-10 19:11:11 +00:00
|
|
|
# ── 8. Read lm_eth_after ────────────────────────────────────────────────────────
|
2026-03-09 03:28:10 +00:00
|
|
|
log "Reading floor after agent run..."
|
2026-03-10 19:11:11 +00:00
|
|
|
LM_ETH_AFTER=$(compute_lm_total_eth)
|
2026-03-09 09:23:37 +00:00
|
|
|
|
|
|
|
|
# ── 8a. Extract and persist strategy findings ──────────────────────────────────
|
|
|
|
|
log "Extracting strategy findings from agent output..."
|
|
|
|
|
extract_memory "$STREAM_LOG"
|
2026-03-10 19:11:11 +00:00
|
|
|
log " lm_eth_after = $LM_ETH_AFTER wei"
|
2026-03-09 03:28:10 +00:00
|
|
|
|
2026-03-11 02:08:06 +00:00
|
|
|
# ── 8b. Export attack sequence and replay with AttackRunner ────────────────────
|
|
|
|
|
# Converts the agent's cast send commands to structured JSONL and replays them
|
|
|
|
|
# via AttackRunner.s.sol to capture full state snapshots for optimizer training.
|
|
|
|
|
log "Exporting attack sequence from stream log..."
|
|
|
|
|
set +e
|
|
|
|
|
python3 "$REPO_ROOT/scripts/harb-evaluator/export-attacks.py" \
|
|
|
|
|
"$STREAM_LOG" "$ATTACK_EXPORT" 2>&1 | while IFS= read -r line; do log " $line"; done
|
|
|
|
|
EXPORT_EXIT=${PIPESTATUS[0]}
|
|
|
|
|
set -e
|
|
|
|
|
|
|
|
|
|
if [[ $EXPORT_EXIT -eq 0 && -f "$ATTACK_EXPORT" && -s "$ATTACK_EXPORT" ]]; then
|
|
|
|
|
log " Attack export: $ATTACK_EXPORT"
|
|
|
|
|
log " Replaying attack sequence with AttackRunner for state snapshots..."
|
|
|
|
|
set +e
|
|
|
|
|
(cd "$REPO_ROOT/onchain" && \
|
|
|
|
|
ATTACK_FILE="$ATTACK_EXPORT" \
|
|
|
|
|
DEPLOYMENTS_FILE="deployments-local.json" \
|
|
|
|
|
"$FORGE" script script/backtesting/AttackRunner.s.sol \
|
|
|
|
|
--rpc-url "$RPC_URL" --broadcast 2>&1 \
|
|
|
|
|
| grep '^{' >"$ATTACK_SNAPSHOTS")
|
|
|
|
|
REPLAY_EXIT=$?
|
|
|
|
|
set -e
|
|
|
|
|
if [[ $REPLAY_EXIT -eq 0 && -s "$ATTACK_SNAPSHOTS" ]]; then
|
|
|
|
|
SNAPSHOT_COUNT=$(wc -l <"$ATTACK_SNAPSHOTS")
|
|
|
|
|
log " AttackRunner replay complete: $SNAPSHOT_COUNT snapshots → $ATTACK_SNAPSHOTS"
|
|
|
|
|
else
|
|
|
|
|
log " WARNING: AttackRunner replay produced no snapshots (exit $REPLAY_EXIT) — non-fatal"
|
|
|
|
|
fi
|
|
|
|
|
# Revert to the clean baseline after replay so the floor check below is unaffected.
|
|
|
|
|
"$CAST" rpc anvil_revert "$SNAP" --rpc-url "$RPC_URL" >/dev/null 2>&1 || true
|
|
|
|
|
# Re-take the snapshot so cleanup trap still has a valid ID to revert.
|
|
|
|
|
SNAP=$("$CAST" rpc anvil_snapshot --rpc-url "$RPC_URL" | tr -d '"')
|
|
|
|
|
else
|
|
|
|
|
log " WARNING: No attack operations exported from stream — skipping AttackRunner replay"
|
|
|
|
|
fi
|
|
|
|
|
|
2026-03-09 03:28:10 +00:00
|
|
|
# ── 9. Summarise results ───────────────────────────────────────────────────────
|
|
|
|
|
log ""
|
|
|
|
|
log "=== RED-TEAM SUMMARY ==="
|
|
|
|
|
log ""
|
2026-03-10 19:11:11 +00:00
|
|
|
log " lm_eth_before : $LM_ETH_BEFORE wei"
|
|
|
|
|
log " lm_eth_after : $LM_ETH_AFTER wei"
|
2026-03-09 03:28:10 +00:00
|
|
|
log ""
|
|
|
|
|
|
|
|
|
|
BROKE=false
|
2026-03-13 08:28:26 +00:00
|
|
|
if python3 -c "import sys; sys.exit(0 if int('${LM_ETH_AFTER:-0}') < int('${LM_ETH_BEFORE:-0}') else 1)"; then
|
2026-03-09 03:28:10 +00:00
|
|
|
BROKE=true
|
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
|
if [[ "$BROKE" == "true" ]]; then
|
2026-03-13 08:28:26 +00:00
|
|
|
DELTA=$(python3 -c "print(int('${LM_ETH_BEFORE:-0}') - int('${LM_ETH_AFTER:-0}'))")
|
2026-03-10 19:11:11 +00:00
|
|
|
log " RESULT: ETH EXTRACTED ❌"
|
|
|
|
|
log " Decrease: $DELTA wei"
|
2026-03-09 03:28:10 +00:00
|
|
|
log ""
|
|
|
|
|
log " See $REPORT for the winning strategy."
|
|
|
|
|
log ""
|
|
|
|
|
# Append a machine-readable summary to the report
|
|
|
|
|
cat >>"$REPORT" <<SUMMARY_EOF
|
|
|
|
|
|
|
|
|
|
=== RUNNER SUMMARY ===
|
2026-03-10 19:11:11 +00:00
|
|
|
lm_eth_before : $LM_ETH_BEFORE
|
|
|
|
|
lm_eth_after : $LM_ETH_AFTER
|
2026-03-09 03:28:10 +00:00
|
|
|
delta : -$DELTA
|
2026-03-10 19:11:11 +00:00
|
|
|
verdict : ETH_EXTRACTED
|
2026-03-09 03:28:10 +00:00
|
|
|
SUMMARY_EOF
|
|
|
|
|
exit 1
|
|
|
|
|
else
|
2026-03-10 19:11:11 +00:00
|
|
|
log " RESULT: ETH SAFE ✅"
|
2026-03-09 03:28:10 +00:00
|
|
|
log ""
|
|
|
|
|
log " See $REPORT for strategies attempted."
|
|
|
|
|
log ""
|
|
|
|
|
cat >>"$REPORT" <<SUMMARY_EOF
|
|
|
|
|
|
|
|
|
|
=== RUNNER SUMMARY ===
|
2026-03-10 19:11:11 +00:00
|
|
|
lm_eth_before : $LM_ETH_BEFORE
|
|
|
|
|
lm_eth_after : $LM_ETH_AFTER
|
2026-03-09 03:28:10 +00:00
|
|
|
delta : 0 (or increase)
|
2026-03-10 19:11:11 +00:00
|
|
|
verdict : ETH_SAFE
|
2026-03-09 03:28:10 +00:00
|
|
|
SUMMARY_EOF
|
|
|
|
|
exit 0
|
|
|
|
|
fi
|