TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x09403fd14510f8196f7879ef514827cd76960b5d checked chain 1 proxy
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$2,164,672.75
last balance 3 months ago
ETH
0.0000
WETH
698.2815
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 4 total 4
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 2
checked 3 months ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
critical codex trade() never updates currentBalances, enabling balance overwrite to mint margin no
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
info cast Heavy EXTCODE*/BALANCE usage no

Codex

latest run
complete findings
One critical accounting bug in trade() lets an attacker mint margin via multi-trade balance overwrites and withdraw it, potentially draining the contract’s entire margin-token balance.
Top findings
  • critical trade() never updates currentBalances, enabling balance overwrite to mint margin

Code Metadata

fingerprint
Created block
10506362
Code size
1951
Codehash
0xf4cdb4ff1d95a5893d2d78a87e133ad063f90936a8398a2602e0e66501835823
Impl codehash
0x41cef5d8b53b355d93c0175ece056d29cabcf59e2a4f7057c7400ed4844eab2b
Priority score
2164672.753451

Recent Runs

last 20
Run ID Status Validated Total findings Created
No runs yet.