TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x0d90b565cd67733f70c21fe38f355e3469012856 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$248.00
last balance 3 months ago
ETH
0.0800
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
2
confirmed findings
crit 0 high 2 unconfirmed 1 total 3
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable yes yes
high detector ETH value transfer possible yes yes
Show unconfirmed findings
Severity Tool Title Validated Confirmed
low codex Contract appears payable and may permanently lock ETH no
From run 019b3836-3005-71b8-a8ef-ecd5ea5d9540 suppressed 1 initializer finding view all confirmed 2

Codex

latest run
complete bytecode findings
The meaningful issue in this bytecode is an unprotected initializer-style entrypoint: selector inference suggests `0xb50a89f3` can set caller balance and overwrite token metadata without any detected guard. The detector-...
Top findings
  • low Contract appears payable and may permanently lock ETH

Code Metadata

fingerprint
Created block
1042313
Code size
1224
Codehash
0x6a55aab98dc6663cacc55bdd983f51001626c9a38e8dc73bdcfbda7a9fe13c73
Priority score
248.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b3836-3005-71b8-a8ef-ecd5ea5d9540 complete crit 0 high 2 4 3 months ago