TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x373c55c277b866a69dc047cad488154ab9759466 failed chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$382,415.50
last balance 3 months ago
ETH
123.3598
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
2
confirmed findings
crit 0 high 2 unconfirmed 2 total 4
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
failed
attempts 3
checked 1 week ago
error solc version 0.4.2 is too old for supported toolchain

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable yes yes
high detector ETH value transfer possible yes yes
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high codex Phantom ERC20 deposits enable trading fake balances for real assets no
info cast Heavy CALL-family usage no

Codex

latest run
complete findings
Found an exploitable fake‑token deposit path that lets an attacker trade phantom balances for real assets and withdraw them.
Top findings
  • high Phantom ERC20 deposits enable trading fake balances for real assets

Code Metadata

fingerprint
Created block
2500744
Code size
5587
Codehash
0xc514186aa242bd68d8d7951d2b64884ebd88a31665b5412d7f0b2df587e9b882
Priority score
382415.501609

Recent Runs

last 20
Run ID Status Validated Total findings Created
58a5a56b-8358-4516-9f42-50181b41b98b failed crit 0 high 2 4 3 months ago
019b477e-a8c2-7138-bda4-95140339eed6 failed crit 0 high 2 2 3 months ago
019b3844-8205-73b1-8344-ca407030f057 complete crit 0 high 2 2 3 months ago