From cbab4c36da242f69adc77cf820aaacbc37555d22 Mon Sep 17 00:00:00 2001 From: openhands Date: Sat, 14 Mar 2026 02:22:51 +0000 Subject: [PATCH 1/2] fix: NPM_ADDR may be Base Sepolia address in both files (#686) Replace 0x27F971cb582BF9E50F397e4d29a5C7A34f11faA2 (Base Sepolia NonfungiblePositionManager) with the correct Base mainnet address 0x03a520B32c04bf3beef7BEb72E919cF822Ed34F3 in all four files that referenced it, and add an inline comment citing the chain and source. Co-Authored-By: Claude Sonnet 4.6 --- onchain/script/backtesting/AttackRunner.s.sol | 3 ++- onchain/test/FitnessEvaluator.t.sol | 3 ++- scripts/harb-evaluator/export-attacks.py | 3 ++- scripts/harb-evaluator/red-team.sh | 3 ++- 4 files changed, 8 insertions(+), 4 deletions(-) diff --git a/onchain/script/backtesting/AttackRunner.s.sol b/onchain/script/backtesting/AttackRunner.s.sol index 44c68ba..d0281b0 100644 --- a/onchain/script/backtesting/AttackRunner.s.sol +++ b/onchain/script/backtesting/AttackRunner.s.sol @@ -152,7 +152,8 @@ contract AttackRunner is Script { uint24 internal constant POOL_FEE = 10_000; address internal constant WETH = 0x4200000000000000000000000000000000000006; address internal constant SWAP_ROUTER = 0x94cC0AaC535CCDB3C01d6787D6413C739ae12bc4; - address internal constant NPM_ADDR = 0x27F971cb582BF9E50F397e4d29a5C7A34f11faA2; + // Base mainnet NonfungiblePositionManager — https://basescan.org/address/0x03a520B32c04bf3beef7BEb72E919cF822Ed34F3 + address internal constant NPM_ADDR = 0x03a520B32c04bf3beef7BEb72E919cF822Ed34F3; address internal constant V3_FACTORY = 0x4752ba5DBc23f44D87826276BF6Fd6b1C372aD24; // ─── Anvil test accounts ────────────────────────────────────────────────── diff --git a/onchain/test/FitnessEvaluator.t.sol b/onchain/test/FitnessEvaluator.t.sol index 2fc5052..dc4025a 100644 --- a/onchain/test/FitnessEvaluator.t.sol +++ b/onchain/test/FitnessEvaluator.t.sol @@ -139,7 +139,8 @@ contract FitnessEvaluator is Test { uint24 internal constant POOL_FEE = 10_000; address internal constant WETH_ADDR = 0x4200000000000000000000000000000000000006; address internal constant SWAP_ROUTER = 0x94cC0AaC535CCDB3C01d6787D6413C739ae12bc4; - address internal constant NPM_ADDR = 0x27F971cb582BF9E50F397e4d29a5C7A34f11faA2; + // Base mainnet NonfungiblePositionManager — https://basescan.org/address/0x03a520B32c04bf3beef7BEb72E919cF822Ed34F3 + address internal constant NPM_ADDR = 0x03a520B32c04bf3beef7BEb72E919cF822Ed34F3; address internal constant V3_FACTORY = 0x4752ba5DBc23f44D87826276BF6Fd6b1C372aD24; address internal constant FEE_DEST = 0xf6a3eef9088A255c32b6aD2025f83E57291D9011; diff --git a/scripts/harb-evaluator/export-attacks.py b/scripts/harb-evaluator/export-attacks.py index 8b8f1f4..3a0c391 100755 --- a/scripts/harb-evaluator/export-attacks.py +++ b/scripts/harb-evaluator/export-attacks.py @@ -34,7 +34,8 @@ from pathlib import Path # ── Constants (must match red-team.sh and AttackRunner.s.sol) ────────────────── WETH_ADDR = "0x4200000000000000000000000000000000000006" SWAP_ROUTER_ADDR = "0x94cC0AaC535CCDB3C01d6787D6413C739ae12bc4" -NPM_ADDR = "0x27F971cb582BF9E50F397e4d29a5C7A34f11faA2" +# Base mainnet NonfungiblePositionManager — https://basescan.org/address/0x03a520B32c04bf3beef7BEb72E919cF822Ed34F3 +NPM_ADDR = "0x03a520B32c04bf3beef7BEb72E919cF822Ed34F3" def _normalise_addr(addr: str) -> str: diff --git a/scripts/harb-evaluator/red-team.sh b/scripts/harb-evaluator/red-team.sh index 950c389..8a8bef3 100755 --- a/scripts/harb-evaluator/red-team.sh +++ b/scripts/harb-evaluator/red-team.sh @@ -40,7 +40,8 @@ RECENTER_PK=0x5de4111afa1a4b94908f83103eb1f1706367c2e68ca870fc3fb9a804cdab365a WETH=0x4200000000000000000000000000000000000006 SWAP_ROUTER=0x94cC0AaC535CCDB3C01d6787D6413C739ae12bc4 V3_FACTORY=0x4752ba5DBc23f44D87826276BF6Fd6b1C372aD24 -NPM=0x27F971cb582BF9E50F397e4d29a5C7A34f11faA2 +# Base mainnet NonfungiblePositionManager — https://basescan.org/address/0x03a520B32c04bf3beef7BEb72E919cF822Ed34F3 +NPM=0x03a520B32c04bf3beef7BEb72E919cF822Ed34F3 POOL_FEE=10000 # ── Logging helpers ──────────────────────────────────────────────────────────── From 729191d8cad157cedc6a0355f91c9301caba6dbc Mon Sep 17 00:00:00 2001 From: openhands Date: Sat, 14 Mar 2026 02:32:22 +0000 Subject: [PATCH 2/2] ci: retrigger after infra failure