TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x1bda1227875f0f8bb27625dd720f386b40003e14 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 4 total 4
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
1
View top proxies
Workflow
checked
attempts 0
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
critical codex Unprotected init() lets attacker become admin/executor and drain bridge funds no
high detector Authorization based on tx.origin no
medium detector Untrusted CALL target/value reachable no no
medium detector ETH value transfer possible no no

Codex

latest run
complete findings
Unprotected initializer allows first caller to seize admin/executor control and drain all locked ETH via releaseTokens.
Top findings
  • critical Unprotected init() lets attacker become admin/executor and drain bridge funds

Code Metadata

fingerprint
Created block
Code size
13638
Codehash
0x47da3c7dadd49654d092139ae64034f00ef11cf06304e651d4f8dcc128e635c8
Priority score
0.000000
Latest run id

Recent Runs

last 20
Run ID Status Validated Total findings Created
66199f28-d28d-4899-b8fd-5a726218d9b3 complete crit 0 high 0 4 3 months ago