TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x30e3da29d03702ef45d2765feaa6e98b89195241 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 5 total 5
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Workflow
checked
attempts 0
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
critical codex Unrestricted batch transfer allows draining ETH/ERC20 balances no
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
medium detector CREATE/CREATE2 reachable no no
low cast Contract creation opcode present no

Codex

latest run
complete findings
Found an unprotected external entrypoint that executes ETH/ERC20 transfers from the contract using caller-supplied recipient/amount data.
Top findings
  • critical Unrestricted batch transfer allows draining ETH/ERC20 balances

Code Metadata

fingerprint
Created block
Code size
12621
Codehash
0x75238ded1175fcd6c19d105da6537222020ea51b7c25556392977a9e173bab30
Priority score
0.000000
Latest run id

Recent Runs

last 20
Run ID Status Validated Total findings Created
73577ec6-1e74-4f61-9fee-a5ebf7f88ac0 complete crit 0 high 0 5 3 months ago