TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x2c0df87e073755139101b35c0a51e065291cc2d3 skipped chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 2 total 2
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
1
View top proxies
Workflow
skipped
attempts 0
checked 1 week ago
skip blacklisted_codehash

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
critical detector Untrusted DELEGATECALL target reachable no no
medium cast DELEGATECALL present no
From run 00827adf-489d-4605-a887-6e6ea5b81451 suppressed 1 initializer finding view all

Codex

latest run
complete findings
Public initializer can be called by anyone to replace subcontracts and/or execute arbitrary delegatecall logic, enabling full takeover.

Code Metadata

fingerprint
Created block
Code size
5047
Codehash
0x04644afcb4b1e1117edc4e9af5cbd218c205d35735d7966f4c010020ef97f6c9
Priority score
0.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
7616dbd1-9443-4df0-a819-bf6f1ae5ab4f failed crit 0 high 0 2 3 months ago
00827adf-489d-4605-a887-6e6ea5b81451 failed crit 0 high 0 3 3 months ago