TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x080781e41bbd4402a8b9f07df187b7391d707de7 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$217.00
last balance 3 months ago
ETH
0.0700
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
2
confirmed findings
crit 0 high 2 unconfirmed 1 total 3
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable yes yes
high detector ETH value transfer possible yes yes
Show unconfirmed findings
Severity Tool Title Validated Confirmed
medium codex Allowance accounting is split across two mappings, so `allowance()` likely reports the approved cap, not remaining spendable amount no
From run 019b3836-35bd-7032-b1d3-60862afc5118 suppressed 1 initializer finding view all confirmed 2

Codex

latest run
complete bytecode findings
Bytecode matches an ERC20-like token with a publicly callable legacy-constructor path and non-standard allowance bookkeeping. Detector-reported CALLs appear dominated by approve-and-call behavior and helper/precompile-st...
Top findings
  • medium Allowance accounting is split across two mappings, so `allowance()` likely reports the approved cap, not remaining spendable amount

Code Metadata

fingerprint
Created block
1192539
Code size
1994
Codehash
0xef46c335fdccc163c979b676f632b45514e9c0961706a507da1e96c4aa079a0f
Priority score
217.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b3836-35bd-7032-b1d3-60862afc5118 complete crit 0 high 2 4 3 months ago