TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x20d0159c2369d115a7e430516e635267c08ace19 checked chain 1 proxy
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$471,875.56
last balance 3 months ago
ETH
152.2179
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 3 total 3
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 3
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
medium detector Untrusted CALL target/value reachable no no
medium detector ETH value transfer possible no no
info cast Heavy EXTCODE*/BALANCE usage no
From run 32c00cf5-d812-497b-98d4-d7d523f95e8a suppressed 1 initializer finding view all

Codex

latest run
complete findings
Found a concrete takeover path: `HypNative.initialize` is publicly callable and can be used to seize ownership if not yet initialized, then whitelist a malicious bridge/rebalancer and drain all native collateral.

Code Metadata

fingerprint
Created block
23239421
Code size
2882
Codehash
0x12d65d137a79c184284b3b740ec6ccfc153fae6b7e34153a21cd793ddd8f9d9f
Impl codehash
0xa10410672bfd9c9fce59e7e45bb2091656f3e53e11f276135600d4b738e01af1
Priority score
471875.556883

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b477e-dcc2-70e7-82da-44ff20d63fe9 complete crit 0 high 0 1 3 months ago
019b3844-b911-7051-aaf3-0b6a8ffb1294 complete crit 0 high 0 1 3 months ago