TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x45ea918d9ca185aa54cc63ea0809ebd355a0935d checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$310.00
last balance 3 months ago
ETH
0.1000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
2
confirmed findings
crit 0 high 2 unconfirmed 1 total 3
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
high detector ETH value transfer possible yes yes
high detector Untrusted CALL target/value reachable yes yes
Show unconfirmed findings
Severity Tool Title Validated Confirmed
low codex `allowance()` reports a gross approval ceiling, while `transferFrom` enforces a cumulative spent-allowance model no

Codex

latest run
complete bytecode findings
One meaningful issue stands out from the bytecode bundle: allowance accounting is nonstandard and can misreport spendable allowance to ERC-20 integrators. The flagged CALL sinks appear to be a mix of a zero-value approve...
Top findings
  • low `allowance()` reports a gross approval ceiling, while `transferFrom` enforces a cumulative spent-allowance model

Code Metadata

fingerprint
Created block
1199299
Code size
1624
Codehash
0xa5c9edd7479b3755a7c236ede1f5166437ef51a53501c812c78128e227d79791
Priority score
310.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b3836-3613-70ee-858a-687d59285edf complete crit 0 high 2 3 3 months ago