TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x2e1ce0f2ab6b61d5a3d1682a77496c4611860b57 skipped chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 5 total 5
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Workflow
skipped
attempts 0
checked 1 week ago
skip blacklisted_codehash

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
low codex Fee-on-transfer tokens break pool accounting no
info cast Heavy EXTCODE*/BALANCE usage no
info cast Heavy CALL-family usage no
From run 4e8c3a13-f737-4379-a32a-ef45951dc98f suppressed 1 initializer finding view all

Codex

latest run
complete findings
2 findings: unprotected upgradeable initialization can allow takeover if a proxy/implementation is left uninitialized, and pool accounting breaks with fee-on-transfer tokens.
Top findings
  • low Fee-on-transfer tokens break pool accounting

Code Metadata

fingerprint
Created block
Code size
24261
Codehash
0xb7cb50397f42f0641cbe49a567922a1d39d24b5676d06cae70fd35d343d0bbeb
Priority score
0.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
a3ad42fd-78fd-44d3-8c28-1a2fa1b0048b failed crit 0 high 0 4 3 months ago
4e8c3a13-f737-4379-a32a-ef45951dc98f failed crit 0 high 0 6 3 months ago
34a90f5f-1d83-49d7-99ca-888574976d6b failed crit 0 high 0 6 3 months ago