TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x33b202966bef633b952747c4955e404a0011fc63 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$289.18
last balance 3 months ago
ETH
0.0933
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
2
confirmed findings
crit 0 high 2 unconfirmed 3 total 5
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable yes yes
high detector ETH value transfer possible yes yes
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector SELFDESTRUCT reachable no no
medium codex Oracle callback appears to ignore the request id and operate on global state no
medium codex Refund and payout paths use unchecked low-level CALLs no

Codex

latest run
complete bytecode findings
Two bytecode-supported issues stand out: the apparent oracle callback path does not bind callbacks to a request id, and multiple low-level ETH transfers ignore call success. I did not raise the detected SELFDESTRUCT as a...
Top findings
  • medium Oracle callback appears to ignore the request id and operate on global state
  • medium Refund and payout paths use unchecked low-level CALLs

Code Metadata

fingerprint
Created block
1278847
Code size
1787
Codehash
0xf1d621d50175845e12972983eeef9c75411356b0ce6bfc85f5e4ee327ca1b05c
Priority score
289.175017

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b3836-39f1-72d0-8749-e1e69dbd631b complete crit 0 high 2 5 3 months ago