TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x15a86c79665b61a5747563d83aed3337821a8a79 failed chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$50,444.35
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
50,444.35
USDT
0.00
Findings Signal
1
confirmed findings
crit 0 high 1 unconfirmed 9 total 10
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
failed
attempts 1
checked 3 months ago
error slither failed (exit 1): 'forge clean' running (wd: /tmp/slither-nmek44wq) 'forge config --json' running 'forge build --build-info --skip ./test/** ./script/** --force' running (wd: /tmp/slither-nmek44wq) 'forge' returned non-zero exit code 1 Compiling 8 files with Solc 0.8.19 stdout: Solc 0.8.19 finished in 236.05ms Error: Compiler run failed: stderr: Error: Compiler error (/solidity/libsolidity/codegen/LValue.cpp:52):Stack too deep. Try compiling with `--via-ir` (cli) or the equivalent `viaIR: true` (standard JSON) while enabling the optimizer. Otherwise, try removing local variables. stderr: --> contracts/Subs.sol:122:89: stderr: | stderr: 122 | bytes32 subId = getSubId(msg.sender, currentPeriod, expiration, amountPerCycle, receiver, sharesAccumulator, sharesLeft); stderr: | ^^^^^^^^ Traceback (most recent call last): File "/var/www/tripwire/.venv/bin/slither", line 10, in <module> sys.exit(main()) ~~~~^^ File "/var/www/tripwire/.venv/lib/python3.13/site-packages/slither/__main__.py", line 776, in main main_impl(all_detector_classes=detectors, all_printer_classes=printers) ~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/var/www/tripwire/.venv/lib/python3.13/site-packages/slither/__main__.py", line 882, in main_impl ) = process_all(filename, args, detector_classes, printer_classes) ~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/var/www/tripwire/.venv/lib/python3.13/site-packages/slither/__main__.py", line 96, in process_all compilations = compile_all(target, **vars(args)) File "/var/www/tripwire/.venv/lib/python3.13/site-packages/crytic_compile/crytic_compile.py", line 722, in compile_all compilations.append(CryticCompile(target, **kwargs)) ~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^ File "/var/www/tripwire/.venv/lib/python3.13/site-packages/crytic_compile/crytic_compile.py", line 211, in __init__ self._compile(**kwargs) ~~~~~~~~~~~~~^^^^^^^^^^ File "/var/www/tripwire/.venv/lib/python3.13/site-packages/crytic_compile/crytic_compile.py", line 633, in _compile self._platform.compile(self, **kwargs) ~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^ File "/var/www/tripwire/.venv/lib/python3.13/site-packages/crytic_compile/platform/foundry.py", line 102, in compile hardhat_like_parsing( ~~~~~~~~~~~~~~~~~~~~^ crytic_compile, str(self._target), build_directory, str(self._project_root) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ) ^ File "/var/www/tripwire/.venv/lib/python3.13/site-packages/crytic_compile/platform/hardhat.py", line 52, in hardhat_like_parsing raise InvalidCompilation(txt) crytic_compile.platform.exceptions.InvalidCompilation: Compilation failed. Can you run build command? /tmp/slither-nmek44wq/out/build-info is not a directory.

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
high detector Untrusted DELEGATECALL target reachable yes yes
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high cast SELFDESTRUCT present no
high codex ERC4626-style share inflation lets early depositor steal later deposits no
medium detector CREATE/CREATE2 reachable no no
medium detector ETH value transfer possible no no
medium cast DELEGATECALL present no
medium detector SELFDESTRUCT reachable no no
medium detector Untrusted CALL target/value reachable no no
low cast Contract creation opcode present no
info cast Heavy CALL-family usage no

Codex

latest run
complete source findings
One high-severity accounting issue: share inflation attack if the adapter is deployed without the initial share seeding described in comments.
Top findings
  • high ERC4626-style share inflation lets early depositor steal later deposits

Code Metadata

fingerprint
Created block
20355181
Code size
10509
Codehash
0x25f2af61e6ae844b31b40cb60dbad3dc42ccf3aa6561f70a06fbd9f48e67d25f
Priority score
50444.351760

Recent Runs

last 20
Run ID Status Validated Total findings Created
019bb50b-e0f2-711c-aedb-1c48d3e2f46f failed crit 0 high 1 10 3 months ago