TW
Tripwire
Find contracts. Test them. Review real vulns.

Analysis Run

019ba4db-e543-73e9-b2b8-f25f0b6dc6b6

failed
Chain ID
1
Address
Block Number
20508739
Created
Fri, Jan 9, 2026 10:23 PM
Review Summary

What survived the funnel

Open this run to answer one question: is this real attacker-relevant behavior with real impact, or just normal contract plumbing?

Confirmed
0
Validated
0
Source
Bytecode only
Review Backing
Not yet
Best current signal
No finding summary available yet.
crit 0 high 0 direct contract
Review Checklist
1. Read the findings table first. Ignore raw jobs until the result looks real.
2. Confirm attacker control, not just the existence of a sink.
3. Confirm money or privilege impact.
4. Keep it if the behavior is real. Kill it if this is normal proxy, admin, or upgrade plumbing.

Processing Jobs

Status & attempts
ID Type Status Attempts Heartbeat
31825 artifact.fetch failed 3 / 3 3 months ago
31826 proxy.resolve failed 3 / 3 3 months ago
31827 tool.cast_disasm failed 3 / 3 3 months ago
31828 analysis.bundle failed 3 / 3 3 months ago
31829 capability.graph failed 3 / 3 3 months ago
31830 detector.run failed 3 / 3 3 months ago
31831 validation.fork complete 1 / 3 3 months ago

Artifact

No artifact recorded yet.

Slither

tool.slither

No slither job recorded yet.

Codex

report.consolidate

No codex job recorded yet.

Opcode Heuristics

tool.cast_disasm
Delegatecall
0
Selfdestruct
0
CREATE2
0
CALL-family (heavy)
0
EXT*/BALANCE
0
Total opcodes
Flags
No heuristic flags raised.
View stderr
Traceback (most recent call last):
  File "/var/www/tripwire/worker/worker.py", line 190, in main
    raise ValueError("job type missing from metadata")
          ~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/var/www/tripwire/worker/worker.py", line 98, in dispatch_job
    return artifact_fetch.run(job_id, job_meta, run_data, config, log)
           ~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File "/var/www/tripwire/worker/jobs/cast_disasm.py", line 466, in run
    raise ValueError("artifact missing runtime_bytecode after retries")
ValueError: artifact missing runtime_bytecode after retries

Findings

validated = confirmed for call sinks; sink observed for others
Severity Category Tool Title Confidence Validated Confirmed Details
No findings yet.