TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x61488ae9dedca3f29f5e72bbf23ba975862c20ba skipped chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
1
confirmed findings
crit 1 high 0 unconfirmed 7 total 8
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
1
View top proxies
Workflow
skipped
attempts 0
checked 1 week ago
skip blacklisted_codehash

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
critical detector Untrusted DELEGATECALL target reachable yes yes
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector ETH value transfer possible no no
high detector Untrusted CALL target/value reachable no no
medium slither Reentrancy in L1OpUSDCBridgeAdapter.burnLockedUSDC() (src/contracts/L1OpUSDCBridgeAdapter.sol#113-137): no
medium cast DELEGATECALL present no
medium codex Replayable failed messages inflate locked funds accounting no
info cast Heavy EXTCODE*/BALANCE usage no
info cast Heavy CALL-family usage no

Codex

latest run
complete findings
Found 1 medium issue: failed cross-domain message replays can over-credit locked funds.
Top findings
  • medium Replayable failed messages inflate locked funds accounting

Code Metadata

fingerprint
Created block
Code size
10298
Codehash
0x6aaa98bab6cc1c7522d69f9d2e966e67a047518704be2a99e1b10688576921c5
Priority score
0.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
de28fc7d-facb-4a24-99e8-e7bf8312fa97 failed crit 1 high 0 7 3 months ago
c4ec9b86-f84f-462e-89f0-0a1a08973858 failed crit 1 high 0 8 3 months ago