TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x24d937143d3f5cf04c72ba112735151a8cae2262 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 6 total 6
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
1
View top proxies
Workflow
checked
attempts 0
checked 3 months ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high codex Unprotected initialize allows hostile takeover of clones no
medium codex `withdraw_admin_fees` can be reentered to withdraw fees multiple times no
medium detector Untrusted CALL target/value reachable no no
medium detector ETH value transfer possible no no
low codex Unchecked ERC20 transfer result in `withdraw_admin_fees` can zero admin fees on failed transfer no
info cast Heavy CALL-family usage no

Codex

latest run
complete source findings
Found three issues: unprotected initialization, reentrancy risk in fee withdrawal, and unchecked ERC20 transfer results when withdrawing admin fees.
Top findings
  • high Unprotected initialize allows hostile takeover of clones
  • medium `withdraw_admin_fees` can be reentered to withdraw fees multiple times
  • low Unchecked ERC20 transfer result in `withdraw_admin_fees` can zero admin fees on failed transfer

Code Metadata

fingerprint
Created block
Code size
18065
Codehash
0x49eaa6cd39782f97f1146b96fc0c0f228eae412c052fc6bbee474bda0d6ce365
Priority score
0.000000
Latest run id

Recent Runs

last 20
Run ID Status Validated Total findings Created
019bb005-2254-73e9-85d1-87e7597e1544 complete crit 0 high 0 6 3 months ago