TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x0e41862deeca185f784b96a0bc44de21f0436306 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 12 total 12
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high slither CrowdfundWithEditionsLogic.sendValue(address,uint256) (contracts/producers/crowdfunds/crowdfund-with-editions/CrowdfundWithEditionsLogic.sol#165-177) sends eth to arbitrary user no
high slither CrowdfundWithEditionsStorage.fundingCap (contracts/producers/crowdfunds/crowdfund-with-editions/CrowdfundWithEditionsStorage.sol#42) is never initialized. It is used in: no
high slither CrowdfundWithEditionsStorage.operatorPercent (contracts/producers/crowdfunds/crowdfund-with-editions/CrowdfundWithEditionsStorage.sol#48) is never initialized. It is used in: no
high slither CrowdfundWithEditionsStorage.treasuryConfig (contracts/producers/crowdfunds/crowdfund-with-editions/CrowdfundWithEditionsStorage.sol#39) is never initialized. It is used in: no
high slither CrowdfundWithEditionsStorage.feePercentage (contracts/producers/crowdfunds/crowdfund-with-editions/CrowdfundWithEditionsStorage.sol#45) is never initialized. It is used in: no
high slither CrowdfundWithEditionsStorage.operator (contracts/producers/crowdfunds/crowdfund-with-editions/CrowdfundWithEditionsStorage.sol#33) is never initialized. It is used in: no
high slither CrowdfundWithEditionsStorage.editions (contracts/producers/crowdfunds/crowdfund-with-editions/CrowdfundWithEditionsStorage.sol#58) is never initialized. It is used in: no
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
medium codex Anyone can trigger withdrawals at any time, breaking funding cap and redemption backing no
low codex Reentrancy in _withdraw allows treasury to collect multiple fees no
info cast Heavy EXTCODE*/BALANCE usage no

Codex

latest run
complete source findings
Found 2 issues: unrestricted withdraw allows premature fund distribution and a reentrancy window in _withdraw lets a malicious treasury over-collect fees.
Top findings
  • medium Anyone can trigger withdrawals at any time, breaking funding cap and redemption backing
  • low Reentrancy in _withdraw allows treasury to collect multiple fees

Code Metadata

fingerprint
Created block
Code size
6330
Codehash
0x374fafadfb13a62bf6b5930f3f4e73447845664c52bc7b633af63349b84aa488
Priority score
0.000000
Latest run id

Recent Runs

last 20
Run ID Status Validated Total findings Created
019bb004-9839-71fb-bf53-cdb271c42b17 complete crit 0 high 0 12 3 months ago