TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x2d662361a828e67cd29b4070aad8c6914dc3309e checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$387,500.00
last balance 3 months ago
ETH
125.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 3 total 3
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 4
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Authorization based on tx.origin no
medium detector Untrusted CALL target/value reachable no no
medium detector ETH value transfer possible no no
From run c96090a4-5167-4be1-9f51-f3571b1b9bb9 suppressed 1 initializer finding view all

Codex

latest run
complete findings
One concrete takeover path exists if the init flag is still unset; the public initializer lets an attacker set themselves as owner and then execute asset transfers.

Code Metadata

fingerprint
Created block
14840217
Code size
6505
Codehash
0x523d6772caa412f3549457cb2ab68d0959565cb1a130c39631077a87d99e7693
Priority score
387500.000310

Recent Runs

last 20
Run ID Status Validated Total findings Created
c96090a4-5167-4be1-9f51-f3571b1b9bb9 complete crit 0 high 0 4 3 months ago
019b477e-c893-72fb-9582-43dadfde6332 complete crit 0 high 0 3 3 months ago
019b3844-a276-7005-b770-527c358dea75 complete crit 0 high 0 3 3 months ago