TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x7a477d6570386e2b9d0f14d03bd976b0c68b94b9 skipped chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 8 total 8
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
1
View top proxies
Workflow
skipped
attempts 0
checked 1 week ago
skip blacklisted_codehash

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high codex Delegatecall into adapter grants full vault control if adapter is compromised or upgradeable no
high detector Untrusted DELEGATECALL target reachable no no
high detector Authorization based on tx.origin no
medium detector Untrusted CALL target/value reachable no no
medium cast DELEGATECALL present no
medium detector ETH value transfer possible no no
info cast Heavy CALL-family usage no
info cast Heavy EXTCODE*/BALANCE usage no
From run 0bcec04f-71c6-45e6-b451-df0c2c08db21 suppressed 1 initializer finding view all

Codex

latest run
complete findings
Found 2 issues: a dangerous delegatecall trust boundary to the adapter and an unprotected initializer that can be front-run if deployment is not atomic.
Top findings
  • high Delegatecall into adapter grants full vault control if adapter is compromised or upgradeable

Code Metadata

fingerprint
Created block
Code size
21028
Codehash
0xbc004f402c4761f7aa68555388fea4bc6b031e2fdae072c9737e0c035cc7beba
Priority score
0.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
a7b23233-40a4-438a-9132-337711ef4606 failed crit 0 high 0 7 3 months ago
0bcec04f-71c6-45e6-b451-df0c2c08db21 failed crit 0 high 0 9 3 months ago