TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x60510caf94f3001651e3e83f5e0ebdd303758aae checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$139,150.78
last balance 3 months ago
ETH
44.8873
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 6 total 6
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 3
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
critical codex Reentrant reward payout lets attackers claim the same rewards multiple times no
high detector Untrusted DELEGATECALL target reachable no no
medium cast DELEGATECALL present no
medium detector Untrusted CALL target/value reachable no no
medium detector ETH value transfer possible no no
info cast Heavy CALL-family usage no

Codex

latest run
complete findings
1 critical reentrancy allows repeated reward claims and draining the contract’s ETH reward pool.
Top findings
  • critical Reentrant reward payout lets attackers claim the same rewards multiple times

Code Metadata

fingerprint
Created block
19491050
Code size
24090
Codehash
0xb200ac0fe41d18deec9cbf80f5401acf9896b60fa6b14738b0de87b806793e83
Priority score
139150.778910

Recent Runs

last 20
Run ID Status Validated Total findings Created
aaad28a3-b6c9-4817-a4d8-9f7fbf189252 complete crit 0 high 0 6 3 months ago
019b477e-d5b6-71cf-b580-394b27dc2f48 complete crit 0 high 0 3 3 months ago
019b3844-ad5c-70ea-b0e2-a2b8ccfa827c complete crit 0 high 0 3 3 months ago