TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x50491cd38153f24396debb0033dce23debb49392 checked chain 1 proxy
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$350,454.56
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
350,454.56
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 8 total 8
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 2
checked 3 months ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
critical detector Untrusted DELEGATECALL target reachable no no
high codex Unprotected auction initialization allows admin/wallet hijack and theft of sale tokens no
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
medium detector CREATE/CREATE2 reachable no no
medium cast DELEGATECALL present no
low cast Contract creation opcode present no
info cast Heavy EXTCODE*/BALANCE usage no

Codex

latest run
complete findings
Found a front-runnable, unprotected initialization path that lets an attacker seize admin/wallet control and steal the entire auction token allocation before the legitimate initializer executes.
Top findings
  • high Unprotected auction initialization allows admin/wallet hijack and theft of sale tokens

Code Metadata

fingerprint
Created block
13396694
Code size
45
Codehash
0xe7942f858afcaecf5816f8e41e5ae811a4f54233707554502f6e7d2d7a57565c
Impl codehash
0xc02f9043371965f249e6af94b12ba88fa56dca0e31835d90958e697af3504fa4
Priority score
350454.563759

Recent Runs

last 20
Run ID Status Validated Total findings Created
No runs yet.