TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x64192819ac13ef72bf6b5ae239ac672b43a9af08 checked chain 1 proxy
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$6,463,855.03
last balance 3 months ago
ETH
1,909.4563
WETH
0.5700
USDC
542,773.41
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 9 total 9
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 3
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
critical codex Unprotected initializeV5 allows attacker to seize migrator role and whitelist a drain recipient no
high cast SELFDESTRUCT present no
high detector Untrusted CALL target/value reachable no no
high detector SELFDESTRUCT reachable no no
high detector ETH value transfer possible no no
medium detector CREATE/CREATE2 reachable no no
low cast Contract creation opcode present no
info cast Heavy EXTCODE*/BALANCE usage no
info cast Heavy CALL-family usage no

Codex

latest run
complete findings
Found 1 critical access-control issue: an unprotected reinitializer lets any caller seize migrator privileges and drain bridge liquidity if not yet executed post-upgrade.
Top findings
  • critical Unprotected initializeV5 allows attacker to seize migrator role and whitelist a drain recipient

Code Metadata

fingerprint
Created block
15006576
Code size
2608
Codehash
0x0056b13fe37ddbd9242080b5d379ce3d34b6b32ae112d3fe82a6d73469cfd05d
Impl codehash
0x217223af8b7f3cb34126fd6319e7437e62db00ff025cfe6465a85937f9b5347d
Priority score
6463855.032414

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b477e-c961-7044-a84c-61b993f0438a complete crit 0 high 0 1 3 months ago
019b3844-a2ff-73b2-b8c5-29654f06867a complete crit 0 high 0 1 3 months ago