
Built a CLI tool in Rust to disassemble and audit EVM bytecode
I built a quick tool for when you want to inspect raw bytecode without spinning up a full decompiler.
What it does:
- Decodes raw hex into a formatted instruction table
- Detects dangerous opcodes: DELEGATECALL, SELFDESTRUCT, CREATE2...
- Catches unchecked CALL return values (CALL followed by POP)
- JSON output for scripting/tooling integration
- 31 tests (unit + integration)
Feedback is very welcome !
https://github.com/x0t0wt1w/revmc
Thank you !
u/ElegantBullfrog5108 — 1 day ago