TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x522a1bc31fa8d9421c29506d4e600aecefaa1b7d checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 3 total 3
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
1
View top proxies
Workflow
checked
attempts 0
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
medium detector Untrusted CALL target/value reachable no no
medium detector ETH value transfer possible no no
info cast Heavy EXTCODE*/BALANCE usage no
From run 32c00cf5-d812-497b-98d4-d7d523f95e8a suppressed 1 initializer finding view all

Codex

latest run
complete findings
Found a concrete takeover path: `HypNative.initialize` is publicly callable and can be used to seize ownership if not yet initialized, then whitelist a malicious bridge/rebalancer and drain all native collateral.

Code Metadata

fingerprint
Created block
Code size
13916
Codehash
0xa10410672bfd9c9fce59e7e45bb2091656f3e53e11f276135600d4b738e01af1
Priority score
0.000000
Latest run id

Recent Runs

last 20
Run ID Status Validated Total findings Created
32c00cf5-d812-497b-98d4-d7d523f95e8a complete crit 0 high 0 4 3 months ago