TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x2bae491b065032a76be1db9e9ecf5738afae203e checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 5 total 5
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
1
View top proxies
Workflow
checked
attempts 0
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
medium codex External FRT mint before state updates enables reentrancy in claim flows no
info cast Heavy EXTCODE*/BALANCE usage no
info cast Heavy CALL-family usage no
From run a05c4fac-ff2e-4d67-b086-539db9c0a0b3 suppressed 1 initializer finding view all

Codex

latest run
complete findings
Found 2 issues: an unprotected initializer that enables proxy takeover, and a reentrancy risk in claim flows due to external token minting before state updates.
Top findings
  • medium External FRT mint before state updates enables reentrancy in claim flows

Code Metadata

fingerprint
Created block
Code size
22262
Codehash
0xe6ef936f4fe68c17e4e23700210a41807f178454332b0e880558d877248a0c02
Priority score
0.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
4b8be3d2-a217-469b-8019-21ef3302b0a8 complete crit 0 high 0 5 3 months ago
a05c4fac-ff2e-4d67-b086-539db9c0a0b3 complete crit 0 high 0 6 3 months ago