NO.0x0001
- people have completed this challenge
Contributor:

Function Selector Phishing Attack

Challenge: Identify the Real Function Being Called

Educational Purpose Only - Phishing Simulation

Function Selector Analysis Challenge

Below is a transaction calldata. The first 4 bytes (8 characters after 0x) is the function selector. Your task is to identify which function this selector corresponds to.

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

Hint: You can decode the function selector using https://openchain.xyz/signatures

You can decode the full calldata using https://calldata.swiss-knife.xyz/decoder

What function does the selector 0x38ed1739 correspond to?

transfer(address,uint256)
approve(address,uint256)
swapExactTokensForTokens(uint256,uint256,address[],address,uint256)
transferFrom(address,address,uint256)

This challenge is locked. Please complete the beginner challenge1 first.