TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x07ddce60658a61dc1732cacf2220fce4a01c49b0 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.54
last balance 3 months ago
ETH
0.0002
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 2 total 2
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
1
View top proxies
Workflow
checked
attempts 0
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
From run bcd4586e-de87-48ab-b48b-5b7155755114 suppressed 1 initializer finding view all

Codex

latest run
complete findings
Found 1 critical upgradeability issue: the v6 reinitializer is externally callable without access control, enabling role takeover and forged finalizations that can drain escrowed ETH.

Code Metadata

fingerprint
Created block
21321274
Code size
21602
Codehash
0x6859f783a9231982b1eb8fc64b9648b76e97bb6f9f2beebd27d33972abb71614
Priority score
0.538932
Latest run id

Recent Runs

last 20
Run ID Status Validated Total findings Created
bcd4586e-de87-48ab-b48b-5b7155755114 complete crit 0 high 0 3 3 months ago