TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x52083b1a21a5abc422b1b0bce5c43ca86ef74cd1 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$240,660.30
last balance 3 months ago
ETH
77.6324
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 3 total 3
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 3
checked 2 weeks ago
skip blacklisted_codehash

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
medium detector Untrusted CALL target/value reachable no no
medium detector ETH value transfer possible no no
info cast Heavy EXTCODE*/BALANCE usage no

Codex

latest run
complete no findings
No concrete, exploitable profit path identified in `contracts/Contract.sol` under the stated assumptions. Residual risk: behavior depends on the external PlayerBook contract at a fixed address, which is out of scope here...

Code Metadata

fingerprint
Created block
6016109
Code size
20781
Codehash
0xb1bc86ad53de6819042198e5695bc2157c825be95a7a883b3f27027988dd0988
Priority score
240660.302296

Recent Runs

last 20
Run ID Status Validated Total findings Created
38b0e71e-fdbe-45c7-9eb3-395d6d68154a failed crit 0 high 0 3 3 months ago
019b477e-b03f-728c-8d9f-dd0b8abb6965 complete crit 0 high 0 2 3 months ago
019b3844-8f20-7200-ad87-8a95203c0d08 complete crit 0 high 0 2 4 months ago