TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x6faee7aac498326660ac2b7207b9f67666073111 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 6 total 6
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
2
View top proxies
Workflow
checked
attempts 0
checked 3 months ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Authorization based on tx.origin no
medium detector ETH value transfer possible no no
medium detector CREATE/CREATE2 reachable no no
medium detector Untrusted CALL target/value reachable no no
low cast Contract creation opcode present no
info cast Heavy EXTCODE*/BALANCE usage no
From run 019bab3d-a126-71a9-ba02-d6d1d782d905 suppressed 1 initializer finding view all

Codex

latest run
complete source findings
Found one high-severity upgradeability risk: the AToken initializer is externally callable without access control, enabling takeover if a proxy or instance is deployed without atomic initialization.

Code Metadata

fingerprint
Created block
Code size
10204
Codehash
0xc2ef6e4ce2fe4c2aa1689ee1f2ff7310ea1ffca648f8662f7caa41c3235e64c3
Priority score
0.000000
Latest run id

Recent Runs

last 20
Run ID Status Validated Total findings Created
019bab3d-a126-71a9-ba02-d6d1d782d905 complete crit 0 high 0 7 3 months ago