TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x6912088890254e69970baedb03284fb3d8fbcda0 checked chain 1 proxy
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$750,000.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
750,000.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 2 total 2
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 2
checked 3 months ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
medium detector Untrusted CALL target/value reachable no no
medium detector ETH value transfer possible no no
From run 454b8231-54e3-4154-96fc-ae4c5d6e8e6a suppressed 1 initializer finding view all

Codex

latest run
complete findings
Found 1 critical exploit path: a public initializer enables ownership takeover and full collateral drain if initialize is not called at deployment.

Code Metadata

fingerprint
Created block
22689335
Code size
2882
Codehash
0x12d65d137a79c184284b3b740ec6ccfc153fae6b7e34153a21cd793ddd8f9d9f
Impl codehash
0x8943ea4cb033504d713f7a1fc2db45d7d7fc0286bff323a1a05f7e5c2d8dfd12
Priority score
750000.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
No runs yet.