TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x471756ad2124b04dc1c5c364ee6a9e29f8c3f67a checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 3 total 3
validated = confirmed for call sinks; sink observed for others

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high codex executeTxWithPermits allows reentrant double-execution of the same transaction no
high detector ETH value transfer possible no no
high detector Untrusted CALL target/value reachable no no

Codex

latest run
complete findings
Found a reentrancy in permit-based execution that lets a malicious owner contract double-spend an approved transfer.
Top findings
  • high executeTxWithPermits allows reentrant double-execution of the same transaction

Code Metadata

fingerprint
Created block
Code size
11068
Codehash
0xe55185749ac9386313a95ddd545bdf19ca95a9f359835e93ae997e4b544706b3
Priority score
0.000000
Latest run id

Recent Runs

last 20
Run ID Status Validated Total findings Created
48761642-a2bb-4ad0-8c2c-796509a9987b complete crit 0 high 0 3 3 months ago