TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x67cb903ca9d07107784bc9398a75a0543524c353 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$61,500.00
last balance 3 months ago
ETH
15.0000
WETH
0.0000
USDC
15,000.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 5 total 5
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 3
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
high slither Reentrancy in MultiSigWalletWithTimelock.executeTransaction(uint256) (contracts/MultiSigWalletWithTimelock.sol#319-341): no
medium codex Timelock bypass for any destination via emergency selector match no
medium codex Unlock time persists after revocation, enabling immediate execution after re-confirmation no

Codex

latest run
complete source findings
Identified two timelock-logic flaws that allow bypassing or shortening the intended delay on transactions.
Top findings
  • medium Timelock bypass for any destination via emergency selector match
  • medium Unlock time persists after revocation, enabling immediate execution after re-confirmation

Code Metadata

fingerprint
Created block
22924967
Code size
7878
Codehash
0xebc89dc939a485c698c6096dae5706a67dff0fd290cc7ff363ad961cb50c7390
Priority score
61500.000410

Recent Runs

last 20
Run ID Status Validated Total findings Created
019ba9e0-be33-70d3-85ba-7d14b6e68e64 complete crit 0 high 0 5 3 months ago
019b477e-dc48-72ef-9f28-99f8eeea85f4 complete crit 0 high 0 2 3 months ago
019b3844-b7bc-7227-9cd7-3141ec17a05d complete crit 0 high 0 2 3 months ago