TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x089af8339c47cfbeab37d115325fc3d2b02f4a1e checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$231,828.32
last balance 3 months ago
ETH
0.0000
WETH
74.7833
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 6 total 6
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Authorization based on tx.origin no
medium codex Authorization uses tx.origin instead of msg.sender no
medium detector Untrusted CALL target/value reachable no no
medium detector ETH value transfer possible no no
info cast Heavy EXTCODE*/BALANCE usage no
info cast Heavy CALL-family usage no

Codex

latest run
complete findings
Identified a tx.origin-based authorization check in the runtime bytecode, which can be bypassed via phishing through a malicious contract.
Top findings
  • medium Authorization uses tx.origin instead of msg.sender

Code Metadata

fingerprint
Created block
12829271
Code size
3675
Codehash
0x8933dd42b818536dd8821d2ac0cea55048d9c29fa3dd7f923f9c88896834a23a
Priority score
231828.319549

Recent Runs

last 20
Run ID Status Validated Total findings Created
b3a1ceb2-01ee-4bdb-a95e-7486ad0194a2 complete crit 0 high 0 6 3 months ago