TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x14a635549fc5d087d39a0cd1339345b8b8c6fdba checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$6,290,639.88
last balance 3 months ago
ETH
2.8782
WETH
0.0000
USDC
6,281,717.55
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 4 total 4
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 2
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high codex Unprotected initialization allows anyone to seize ownership and drain funds if not yet initialized no
high detector Authorization based on tx.origin no
medium detector Untrusted CALL target/value reachable no no
medium detector ETH value transfer possible no no

Codex

latest run
complete findings
Found a permissionless initializer path that allows full takeover and draining if the contract is still uninitialized.
Top findings
  • high Unprotected initialization allows anyone to seize ownership and drain funds if not yet initialized

Code Metadata

fingerprint
Created block
21227386
Code size
6505
Codehash
0x523d6772caa412f3549457cb2ab68d0959565cb1a130c39631077a87d99e7693
Priority score
6290639.879878

Recent Runs

last 20
Run ID Status Validated Total findings Created
b7ce8ac8-0ea4-495f-80fb-6e8e679e5468 complete crit 0 high 0 4 3 months ago
019b477e-d973-7160-9995-dbec6ce379dc complete crit 0 high 0 3 3 months ago