TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x01b25d1f778930769653ffabcd7e7afee0cdc84b checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$248.00
last balance 3 months ago
ETH
0.0800
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
2
confirmed findings
crit 0 high 2 unconfirmed 2 total 4
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable yes yes
high detector ETH value transfer possible yes yes
Show unconfirmed findings
Severity Tool Title Validated Confirmed
medium codex `allowance()` appears to expose total approved amount while `transferFrom()` enforces a separate cumulative-spend counter no
low codex Fallback path appears payable and silently succeeds, which can trap ETH in the token contract no

Codex

latest run
complete bytecode findings
Bytecode analysis suggests an ERC20-like token with no proxy or delegatecall behavior, but it has a meaningful approval/accounting deviation and a permissive fallback that can silently accept ETH. Selector inference is b...
Top findings
  • medium `allowance()` appears to expose total approved amount while `transferFrom()` enforces a separate cumulative-spend counter
  • low Fallback path appears payable and silently succeeds, which can trap ETH in the token contract

Code Metadata

fingerprint
Created block
1169892
Code size
1624
Codehash
0x874efed0297ce2055816a3736c8d2293d47cabbd37cf73418ace9a48771a70c9
Priority score
248.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b3836-3555-70ef-8007-1b2c005df2ea complete crit 0 high 2 4 3 months ago