TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x5fa85a5d220be1391eaeb66542f7e0afd6e461a9 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$31.00
last balance 3 months ago
ETH
0.0100
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
2
confirmed findings
crit 0 high 2 unconfirmed 2 total 4
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable yes yes
high detector ETH value transfer possible yes yes
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high codex Selector 0xa9059cbb appears to grant authorization and invoke a callback instead of performing an ERC20 transfer no
medium codex Approval/callback path performs external CALL after state mutation with no detected guard no

Codex

latest run
complete bytecode findings
The bytecode bundle is not consistent with a normal ERC20 implementation. The strongest issue is that selector 0xa9059cbb dispatches into approval/callback-style logic rather than an obvious balance-moving transfer path,...
Top findings
  • high Selector 0xa9059cbb appears to grant authorization and invoke a callback instead of performing an ERC20 transfer
  • medium Approval/callback path performs external CALL after state mutation with no detected guard

Code Metadata

fingerprint
Created block
1192429
Code size
2000
Codehash
0xd389ff5b897bddbe186c7d13c7e314324a7c27366140c648b241eea08a496ef5
Priority score
31.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b3836-35f6-70f6-b91f-9db2da6f60d7 complete crit 0 high 2 4 3 months ago