TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x4f0255319faa4a7915856300f5ff98a2fe86ae97 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
2
confirmed findings
crit 0 high 2 unconfirmed 3 total 5
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable yes yes
high detector ETH value transfer possible yes yes
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high codex Cooldown/lock check uses reversed subtraction, collapsing the wait period no
medium codex Fallback/unknown-selector path silently accepts ETH without crediting sender no
low codex ETH payouts are sent with stipend-only CALL semantics, which can lock funds for contract recipients no

Codex

latest run
complete bytecode findings
Bytecode review found one high-confidence arithmetic/accounting issue and two lower-confidence ETH-transfer hazards. No proxy/delegatecall pattern was present (`is_proxy=false`, `delegatecall_count=0`).
Top findings
  • high Cooldown/lock check uses reversed subtraction, collapsing the wait period
  • medium Fallback/unknown-selector path silently accepts ETH without crediting sender
  • low ETH payouts are sent with stipend-only CALL semantics, which can lock funds for contract recipients

Code Metadata

fingerprint
Created block
221326
Code size
2783
Codehash
0xbf43ab865a7833ab42f9194a702d0d8f509b6b0233df29ada98c8613a8ca5f50
Priority score
0.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b3831-b4e0-71c5-8142-0d761b2b7ab8 complete crit 0 high 2 5 3 months ago