TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x4ab740157721105ae503fbad756a578171512525 checked chain 1 proxy
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$386,062.67
last balance 3 months ago
ETH
0.0000
WETH
124.1775
USDC
656.36
USDT
456.21
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 7 total 7
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 2
checked 3 months ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
critical detector Untrusted DELEGATECALL target reachable no no
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
medium detector CREATE/CREATE2 reachable no no
medium cast DELEGATECALL present no
low cast Contract creation opcode present no
info cast Heavy EXTCODE*/BALANCE usage no
From run caf881a5-f3a8-4b00-b6b0-31c41e3b5ede suppressed 1 initializer finding view all

Codex

latest run
complete findings
Found a single concrete takeover vector: unprotected initializer lets the first external caller become owner and then add malicious facets to drain all assets.

Code Metadata

fingerprint
Created block
19405246
Code size
1159
Codehash
0x5f20fd6c914c7316a427c7d4c6c5884bae3f173e73d90bbb7bc2763837ea297b
Impl codehash
0x1b36053b947eacc31a1b45a3b072987c6e037cf29daf86f024a40ecb92b31aed
Priority score
386062.672911

Recent Runs

last 20
Run ID Status Validated Total findings Created
No runs yet.