NO.0x0001
- people have completed this challengeContributor:
Function Selector Phishing Attack
Challenge: Identify the Real Function Being Called
Educational Purpose Only - Phishing Simulation
Function Selector Analysis Challenge
Below is a transaction calldata. The first 4 bytes (8 characters after 0x) is the function selector. Your task is to identify which function this selector corresponds to.
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
Hint: You can decode the function selector using https://openchain.xyz/signatures
You can decode the full calldata using https://calldata.swiss-knife.xyz/decoder
What function does the selector 0x38ed1739 correspond to?
transfer(address,uint256)
approve(address,uint256)
swapExactTokensForTokens(uint256,uint256,address[],address,uint256)
transferFrom(address,address,uint256)