TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x2c79e1a51e25fffff54c3becadbf1554841a8fc8 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$43,226.89
last balance 3 months ago
ETH
0.0000
WETH
13.9442
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 6 total 6
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 2 months ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
medium codex Computed CALL targets/values could enable arbitrary external calls/ETH forwarding (if user-controlled) no
low codex External calls can occur before storage updates along CFG path no
info cast Heavy EXTCODE*/BALANCE usage no
info cast Heavy CALL-family usage no

Codex

latest run
complete bytecode findings
Bytecode shows a call-heavy contract with multiple computed CALL targets/values and at least one control-flow path where external calls can occur before storage updates; proxy/delegatecall patterns are not detected.
Top findings
  • medium Computed CALL targets/values could enable arbitrary external calls/ETH forwarding (if user-controlled)
  • low External calls can occur before storage updates along CFG path

Code Metadata

fingerprint
Created block
7336113
Code size
10625
Codehash
0x3dc042a2d247e6ae82fa9b8373ab82369ab2c97f2bbaed66813f1cbc8e8baa7b
Priority score
43226.889479

Recent Runs

last 20
Run ID Status Validated Total findings Created
019c0ea9-0984-7238-bcd4-f122b4ccad2e complete crit 0 high 0 6 2 months ago