TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x28083d8bce883aa7b70130c915cd4308448a6f1e checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 4 total 4
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
1
View top proxies
Workflow
checked
attempts 0
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
critical detector Untrusted DELEGATECALL target reachable no no
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
medium cast DELEGATECALL present no
From run 2763da7f-91ba-434d-8942-6b9a4e4ee8c5 suppressed 1 initializer finding view all

Codex

latest run
complete findings
Found one critical takeover vector if the contract/proxy is left uninitialized, allowing an attacker to seize ownership and drain all ETH.

Code Metadata

fingerprint
Created block
Code size
5582
Codehash
0xfc5553706caac86fb691a4457d5d80b2d523aee9c4a7f461910c9e898cf58a19
Priority score
0.000000
Latest run id

Recent Runs

last 20
Run ID Status Validated Total findings Created
2763da7f-91ba-434d-8942-6b9a4e4ee8c5 complete crit 0 high 0 5 3 months ago