TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x47e3b185398c178c89cad8bda809d037462008a9 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$6.20
last balance 3 months ago
ETH
0.0020
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
2
confirmed findings
crit 0 high 2 unconfirmed 3 total 5
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable yes yes
high detector ETH value transfer possible yes yes
Show unconfirmed findings
Severity Tool Title Validated Confirmed
medium detector CREATE/CREATE2 reachable no no
medium codex Callback-style allowance flow writes state before calling an untrusted contract no
low codex Public function 0xe4849b32 reaches a computed external CALL with ambiguous target/value no

Codex

latest run
complete bytecode findings
Bytecode suggests an ERC20-like token with owner-controlled parameters plus callback-style extensions. The strongest risk is a public allowance/callback path that writes state and then performs an external CALL to a user...
Top findings
  • medium Callback-style allowance flow writes state before calling an untrusted contract
  • low Public function 0xe4849b32 reaches a computed external CALL with ambiguous target/value

Code Metadata

fingerprint
Created block
1478582
Code size
2457
Codehash
0xa63d256176987cd0456db9bba1dd9538cb910648f18b848ef693864a2183a541
Priority score
6.200000

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b3836-4070-73ff-9bdf-855dfff3d504 complete crit 0 high 2 5 3 months ago