| Severity | Tool | Title | Validated | Confirmed |
|---|---|---|---|---|
| critical | detector | Untrusted DELEGATECALL target reachable | no | no |
| high | detector | Untrusted CALL target/value reachable | no | no |
| high | detector | ETH value transfer possible | no | no |
| medium | cast | DELEGATECALL present | no | — |
| medium | codex | Liquidity deployment can be DoS’d by forcing ETH refunds to a contract with no receive() | no | — |
| medium | codex | Liquidity deploys at attacker-controlled ratio if a pair already exists (no slippage / reserve checks) | no | — |
| Run ID | Status | Validated | Total findings | Created |
|---|---|---|---|---|
| 019be3d6-81c4-7091-b835-57b1fa52d217 | failed | crit 0 high 0 | 6 | 2 months ago |
| 019b477e-d522-7256-a111-17e7b4005e88 | complete | crit 0 high 0 | 3 | 3 months ago |
| 019b3844-ac8f-71e7-8361-85cdbcb273ba | complete | crit 0 high 0 | 3 | 3 months ago |