TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x2bf4a701470dfe06babd313926a1ebcdcd5806c1 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.31
last balance 3 months ago
ETH
0.0001
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
2
confirmed findings
crit 0 high 2 unconfirmed 2 total 4
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable yes yes
high detector ETH value transfer possible yes yes
Show unconfirmed findings
Severity Tool Title Validated Confirmed
critical codex Public constructor-like function lets any caller mint/reset token state no
medium codex Allowance accounting appears non-standard and can desynchronize from `allowance()` no

Codex

latest run
complete bytecode findings
Bytecode strongly resembles an old ERC-20 variant with one critical issue: a publicly callable constructor-like function can reset metadata and assign a fresh token balance to any caller. There is also a medium-confidenc...
Top findings
  • critical Public constructor-like function lets any caller mint/reset token state
  • medium Allowance accounting appears non-standard and can desynchronize from `allowance()`

Code Metadata

fingerprint
Created block
1118487
Code size
1998
Codehash
0x1fe5d05ba4023231a6d7175004a34d414a89f4b98b790f305fa4babedcbad7df
Priority score
0.310000

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b3836-3278-73cd-b85f-dc1b759c448b complete crit 0 high 2 4 3 months ago