TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x5fb7f726249ded65635bcebda9b292b026088a87 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$3,100.00
last balance 3 months ago
ETH
1.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
2
confirmed findings
crit 0 high 2 unconfirmed 2 total 4
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable yes yes
high detector ETH value transfer possible yes yes
Show unconfirmed findings
Severity Tool Title Validated Confirmed
critical codex Public selector `0x1d2bca17` can assign arbitrary balance to the caller no
medium codex Same unguarded runtime path appears able to rewrite token metadata (`name`/`symbol`/`decimals`) no

Codex

latest run
complete bytecode findings
Bytecode looks like an ERC20-like token with standard `name`/`symbol`/`decimals`/`balanceOf`/`transfer` selectors plus one unknown public selector (`0x1d2bca17`). The meaningful issue is that this unknown selector appear...
Top findings
  • critical Public selector `0x1d2bca17` can assign arbitrary balance to the caller
  • medium Same unguarded runtime path appears able to rewrite token metadata (`name`/`symbol`/`decimals`)

Code Metadata

fingerprint
Created block
1376824
Code size
1227
Codehash
0x5776ebb5e2724081026d107c5152fae5713d938973a3ee94956b0a576edcbded
Priority score
3100.000310

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b3836-3c1c-73f1-8d3d-ffdb519bf95c complete crit 0 high 2 4 3 months ago