TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x07834b06b5756056e065c0bd1639761ab8297513 skipped chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$1,058,531.93
last balance 3 months ago
ETH
0.0000
WETH
310.0318
USDC
97,433.40
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 6 total 6
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
skipped
attempts 1
checked 1 week ago
skip blacklisted_codehash

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high codex Reentrancy during module removal can permanently lock the SetToken no
high detector Untrusted DELEGATECALL target reachable no no
high detector Authorization based on tx.origin no
medium cast DELEGATECALL present no
medium detector Untrusted CALL target/value reachable no no
medium detector ETH value transfer possible no no

Codex

latest run
complete findings
Identified a high-severity reentrancy/DoS risk in the module removal flow that can permanently lock the SetToken.
Top findings
  • high Reentrancy during module removal can permanently lock the SetToken

Code Metadata

fingerprint
Created block
11700673
Code size
14033
Codehash
0x167cc91d4257afefb644a0cad374e386fcf4c5ebbd8ece2707a45f49e7449c55
Priority score
1058531.931124

Recent Runs

last 20
Run ID Status Validated Total findings Created
21882865-9b4a-4420-b853-fc947442c2be failed crit 0 high 0 6 3 months ago