TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x31aa794e016e7ab71ca8e7456f0d338170393666 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$166,646.89
last balance 3 months ago
ETH
44.1879
WETH
9.5691
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 5 total 5
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 3
checked 1 week ago
skip blacklisted_codehash

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Authorization based on tx.origin no
medium detector ETH value transfer possible no no
medium detector Untrusted CALL target/value reachable no no
medium detector CREATE/CREATE2 reachable no no
low cast Contract creation opcode present no

Codex

latest run
complete no findings
Reviewed `contracts/contracts/RoyaltyPaymentSplitter.sol` in AUDIT_BUNDLE.txt; it is a thin wrapper over OpenZeppelin PaymentSplitter with no custom logic. No concrete, exploitable profit paths found in first-party code.

Code Metadata

fingerprint
Created block
14632649
Code size
6096
Codehash
0xcd5214f9ce0e4a037554ccc0ae2d8cb3aa6ef5ce8037c66a6a3b4588f33e557c
Priority score
166646.886591

Recent Runs

last 20
Run ID Status Validated Total findings Created
c7ca7fe2-3254-42dd-8720-ab41ec5a5d69 failed crit 0 high 0 5 3 months ago
019b477e-c7c8-7327-863a-2860094ac0af complete crit 0 high 0 4 3 months ago
019b3844-a1ed-701c-86f2-380135c66587 complete crit 0 high 0 4 3 months ago