TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x1f75047233517dcf67970d9e3c3bb385cb647f30 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$31.00
last balance 3 months ago
ETH
0.0100
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
2
confirmed findings
crit 0 high 2 unconfirmed 3 total 5
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable yes yes
high detector ETH value transfer possible yes yes
Show unconfirmed findings
Severity Tool Title Validated Confirmed
medium codex Frozen/blacklisted spender can likely bypass restrictions through transferFrom no
medium codex Allowance accounting uses a separate spent ledger, so allowance() likely overstates remaining spendable approval no
low codex Fallback exposes an unchecked low-level CALL with ETH value no

Codex

latest run
complete bytecode findings
Bytecode-only review of the bundle indicates a token-like contract with owner-gated admin paths, a payable fallback CALL, and a custom transferFrom allowance path. The most meaningful issues are a likely freeze/blacklist...
Top findings
  • medium Frozen/blacklisted spender can likely bypass restrictions through transferFrom
  • medium Allowance accounting uses a separate spent ledger, so allowance() likely overstates remaining spendable approval
  • low Fallback exposes an unchecked low-level CALL with ETH value

Code Metadata

fingerprint
Created block
987982
Code size
1830
Codehash
0x0eb138bc38c67222d8de28a094f9e17c26c2137d32d89eac929c4be867a60566
Priority score
31.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b3836-2cf4-7353-96b1-83115f1b65d9 complete crit 0 high 2 5 3 months ago