TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x11dead58e5a21e6e46594fab6cd12e0a40de5e6a checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$3.10
last balance 3 months ago
ETH
0.0010
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
2
confirmed findings
crit 0 high 2 unconfirmed 2 total 4
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable yes yes
high detector ETH value transfer possible yes yes
Show unconfirmed findings
Severity Tool Title Validated Confirmed
medium codex `allowance()` appears to report approved ceiling, not remaining spendable allowance no
low codex Approval callback performs a full-gas external call after writing approval no

Codex

latest run
complete bytecode findings
ERC20-like runtime bytecode with custom approval/callback logic. No proxy/delegatecall path was evident from the bundle. The meaningful issues are a non-standard two-slot allowance model that makes `allowance()` over-rep...
Top findings
  • medium `allowance()` appears to report approved ceiling, not remaining spendable allowance
  • low Approval callback performs a full-gas external call after writing approval

Code Metadata

fingerprint
Created block
1199339
Code size
1624
Codehash
0x874efed0297ce2055816a3736c8d2293d47cabbd37cf73418ace9a48771a70c9
Priority score
3.100000

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b3836-361b-70a4-9b0e-3b9627dda5c8 complete crit 0 high 2 4 3 months ago