TW
Tripwire
Find contracts. Test them. Review real vulns.
Dashboard
Vulns
All Findings
Runs
Contract
0x6de5fabc6b4663bd6bdbc064bbb183e61af1dade
checked
chain 1
proxy
Latest run:
967eefc5-5d64-4367-893f-8979c65295be
complete
Dedaub
Queue
Audit
Audit + LLM
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$1,818,982.52
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
1,818,982.52
USDT
0.00
Findings Signal
0
confirmed findings
Re-run validation
crit 0
high 0
unconfirmed 2
total 2
Latest run
967eefc5-5d64-4367-893f-8979c65295be
complete
validated = confirmed for call sinks; sink observed for others
Proxy & Workflow
linkage
Proxy status
proxy
Implementation address
0x631953e16e8a57fc159e1fb1d92443c981b00770
(tracked)
Proxies pointing here
0
Workflow
checked
attempts 2
checked 3 months ago
Latest Findings
validated = confirmed for call sinks; sink observed for others
Re-run validation
No confirmed findings yet.
Show unconfirmed findings
Severity
Tool
Title
Validated
Confirmed
medium
detector
Untrusted CALL target/value reachable
no
no
medium
detector
ETH value transfer possible
no
no
From run
967eefc5-5d64-4367-893f-8979c65295be
suppressed 1 initializer finding
view all
Codex
latest run
complete
findings
One critical unprotected initializer allows ownership/ISM takeover and forged mailbox processing to drain all collateral if the contract is not yet initialized.
View run
Code Metadata
fingerprint
Created block
22289430
Code size
2882
Codehash
0x12d65d137a79c184284b3b740ec6ccfc153fae6b7e34153a21cd793ddd8f9d9f
Impl codehash
0xd797a38c4600228c370e25772eb5350536a4886fe01216d5568e2c1ab1959a5d
Priority score
1818982.516061
Latest run id
967eefc5-5d64-4367-893f-8979c65295be
Recent Runs
last 20
Run ID
Status
Validated
Total findings
Created
No runs yet.