TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x674bdf20a0f284d710bc40872100128e2d66bd3f checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$12,345,678.95
last balance 3 months ago
ETH
3,365.3823
WETH
1.0806
USDC
1,472,728.89
USDT
436,915.31
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 3 total 3
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 3
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
critical codex Unprotected initialize allows exchange takeover and full fund drain no
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no

Codex

latest run
complete findings
Unprotected initializer lets anyone seize the exchange role before initialization and drain all funds held by the deposit contract.
Top findings
  • critical Unprotected initialize allows exchange takeover and full fund drain

Code Metadata

fingerprint
Created block
11149779
Code size
6145
Codehash
0xc2a552f39457e85cc95500da8b1c36b14dd81e8d833587364d89dcc4cf67c008
Priority score
12345678.953398

Recent Runs

last 20
Run ID Status Validated Total findings Created
83c46581-935d-4c5c-8596-6954c0074eb5 complete crit 0 high 0 3 3 months ago
019b477e-ba92-7198-973a-502250cf978f complete crit 0 high 0 2 3 months ago
019b3844-971e-7180-b487-cab71c806b19 complete crit 0 high 0 2 3 months ago