TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x467a2b91f231d930f5eeb6b982c7666e81da8626 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 7 total 7
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
1
View top proxies
Workflow
checked
attempts 0
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
critical codex Unprotected `setGenesisRootAndAddresses` lets attacker install malicious `zkSeaAddress` facet and drain funds via delegatecall no
high detector Untrusted DELEGATECALL target reachable no no
medium detector Untrusted CALL target/value reachable no no
medium detector ETH value transfer possible no no
medium cast DELEGATECALL present no
info cast Heavy CALL-family usage no
info cast Heavy EXTCODE*/BALANCE usage no

Codex

latest run
complete findings
Unprotected one-time initializer for critical addresses allows attacker-controlled delegatecall facet, enabling direct storage writes and asset drains if the contract is deployed via proxy or otherwise starts with zeroed...
Top findings
  • critical Unprotected `setGenesisRootAndAddresses` lets attacker install malicious `zkSeaAddress` facet and drain funds via delegatecall

Code Metadata

fingerprint
Created block
Code size
22255
Codehash
0xa45c127d4be67ece5bf10bf49c90934c4cc5526a30521a6bd8e013273e34f525
Priority score
0.000000
Latest run id

Recent Runs

last 20
Run ID Status Validated Total findings Created
95d6fcb3-dc31-4ad0-aad7-6796cf5b54e9 complete crit 0 high 0 7 3 months ago