TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x2c683fad51da2cd17793219cc86439c1875c353e skipped chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$10,639,244.30
last balance 3 months ago
ETH
0.0000
WETH
3,432.0143
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 8 total 8
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
skipped
attempts 1
checked 2 weeks ago
skip blacklisted_codehash

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high cast SELFDESTRUCT present no
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
high detector SELFDESTRUCT reachable no no
medium detector CREATE/CREATE2 reachable no no
low cast Contract creation opcode present no
info cast Heavy CALL-family usage no
info cast Heavy EXTCODE*/BALANCE usage no

Codex

latest run
complete no findings
No exploitable vulnerabilities found in the first-party pool implementation. Residual risk primarily depends on correct asset_types configuration and the integrity of external rate oracles/ERC4626 share-price sources.

Code Metadata

fingerprint
Created block
22619146
Code size
23635
Codehash
0xb3e4c3c0d58c09e6b2cf6da2b5bb7cdb4ac3b046b0bbf957e8ead4b1a545ca9e
Priority score
10639244.295827

Recent Runs

last 20
Run ID Status Validated Total findings Created
0f616a1e-5d91-4826-9e29-8a383977d30d failed crit 0 high 0 8 3 months ago