TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x78d43a889f42a344fe98c3fb9455791dc8178d55 skipped chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 10 total 10
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high cast SELFDESTRUCT present no
high detector Authorization based on tx.origin no
medium detector SELFDESTRUCT reachable no no
medium detector Untrusted CALL target/value reachable no no
medium detector ETH value transfer possible no no
medium codex Pool initialization is permissionless and can be front-run no
medium detector CREATE/CREATE2 reachable no no
low cast Contract creation opcode present no
low codex Permit domain separator is cached without chainId check, enabling fork replay no
info cast Heavy CALL-family usage no

Codex

latest run
complete findings
Identified 2 issues: permissionless initialization and a cached EIP-712 domain separator replay window.
Top findings
  • medium Pool initialization is permissionless and can be front-run
  • low Permit domain separator is cached without chainId check, enabling fork replay

Code Metadata

fingerprint
Created block
Code size
19253
Codehash
0xca891afa31c4ea7ff3aab590ad957be486008c5b7412f3110c9c9dbe8eb5c493
Priority score
0.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
6f9be8c5-fdad-4ad0-9fe9-0312de932bb1 failed crit 0 high 0 8 3 months ago
9a608d87-4d7f-4721-8bdf-dd60e7f10e20 failed crit 0 high 0 10 3 months ago