TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x364b7e2d5b11b9d2016d232fa271d89d5e6065f1 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 8 total 8
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Workflow
checked
attempts 0
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
critical detector Untrusted DELEGATECALL target reachable no no
high codex Unprotected initialization enables auction takeover if not initialized atomically no
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
medium detector CREATE/CREATE2 reachable no no
medium cast DELEGATECALL present no
low cast Contract creation opcode present no
info cast Heavy EXTCODE*/BALANCE usage no

Codex

latest run
complete findings
Found 1 high-severity access control issue around initialization that can allow auction takeover if deployment and initialization are not atomic; no other critical issues detected in first-party code.
Top findings
  • high Unprotected initialization enables auction takeover if not initialized atomically

Code Metadata

fingerprint
Created block
Code size
20200
Codehash
0xc02f9043371965f249e6af94b12ba88fa56dca0e31835d90958e697af3504fa4
Priority score
0.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
f737e1d0-6060-4221-9bb6-8d056f16705e complete crit 0 high 0 8 3 months ago
d49d2b94-52b3-40cd-ba7d-b3d971c536fe complete crit 0 high 0 8 3 months ago