TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x0000000aa232009084bd71a5797d089aa4edfad4 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$581,261.31
last balance 3 months ago
ETH
0.0000
WETH
68.3040
USDC
202,401.50
USDT
167,117.55
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 8 total 8
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector ETH value transfer possible no no
high detector Untrusted CALL target/value reachable no no
medium detector CREATE/CREATE2 reachable no no
low codex ECDSA invalid signatures are not rejected (signer can become address(0)) no
low cast Contract creation opcode present no
info cast Heavy CALL-family usage no
info cast Heavy EXTCODE*/BALANCE usage no
info codex Hook data length < 20 bytes can yield an uninitialized hook address and payload length underflow no

Codex

latest run
complete findings
Found a low-severity signature-validation gap and a malformed-hook-data edge case that can lead to unintended behavior under malformed inputs.
Top findings
  • low ECDSA invalid signatures are not rejected (signer can become address(0))
  • info Hook data length < 20 bytes can yield an uninitialized hook address and payload length underflow

Code Metadata

fingerprint
Created block
22971782
Code size
23569
Codehash
0x528182e66a441545ea3ba1dede4e6063f23acd4ada4036c24b9fa2f254bc4ed1
Priority score
581261.311235

Recent Runs

last 20
Run ID Status Validated Total findings Created
0594de5c-02e2-4e9e-aa9a-5ac4784ca5ff complete crit 0 high 0 8 3 months ago