TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x3456f6ea53a44d9bdf0d3da99254860531cb0af5 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$9.30
last balance 3 months ago
ETH
0.0030
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
2
confirmed findings
crit 0 high 2 unconfirmed 3 total 5
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable yes yes
high detector ETH value transfer possible yes yes
Show unconfirmed findings
Severity Tool Title Validated Confirmed
medium detector CREATE/CREATE2 reachable no no
medium codex Best-effort inferred redemption path ignores ETH payout failure no
low codex Financial logic appears to use manipulable block data as randomness no

Codex

latest run
complete bytecode findings
BYTECODE_BUNDLE.json was reviewed directly. I did not find proxy/delegatecall issues. The generic CALL detector mostly hits expected patterns (identity precompile usage and an approve-and-callback flow), but one payout p...
Top findings
  • medium Best-effort inferred redemption path ignores ETH payout failure
  • low Financial logic appears to use manipulable block data as randomness

Code Metadata

fingerprint
Created block
1482059
Code size
2606
Codehash
0xbc9512dd31c5846060b826a844fee483fe053fcba40775ed9fb1e33a380ad47d
Priority score
9.300000

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b3836-3ff9-7388-a9e7-a9e6cfa6cf52 complete crit 0 high 2 5 3 months ago