TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x27d64dd9172e4b59a444817d30f7af8228f174cc checked chain 1 proxy
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$407,879.60
last balance 3 months ago
ETH
131.5741
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 5 total 5
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 3
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
critical codex Unprotected initialize enables proxy hijack and full ETH drain no
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
info cast Heavy EXTCODE*/BALANCE usage no
info cast Heavy CALL-family usage no

Codex

latest run
complete findings
Unprotected proxy initializer lets an attacker set a malicious storage contract and drain all ETH via distributeWithdrawals if the proxy is not initialized atomically.
Top findings
  • critical Unprotected initialize enables proxy hijack and full ETH drain

Code Metadata

fingerprint
Created block
16995250
Code size
2091
Codehash
0x65412846572944e60d705bafe34f1fb5ca0b1539293b62d5752da51cf5014118
Impl codehash
0xe2c0536e18ddbc44dc134f46c3e384167ef2246ed4ac106c3917f68a955361eb
Priority score
407879.601515

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b477e-cf61-73f1-ac93-363dbe0b9a1d complete crit 0 high 0 1 3 months ago
019b3844-a66e-7211-8fc8-e2e6f58551e8 complete crit 0 high 0 1 3 months ago