TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x7aa73b556c0da8ca4e83e483d7404930e946473b checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
2
confirmed findings
crit 0 high 2 unconfirmed 2 total 4
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
high detector ETH value transfer possible yes yes
high detector Untrusted CALL target/value reachable yes yes
Show unconfirmed findings
Severity Tool Title Validated Confirmed
medium codex Public entrypoint can force ETH transfer to the address stored in slot 0 no
low codex Low-level ETH call ignores success/failure no

Codex

latest run
complete bytecode findings
The runtime is a very small two-selector contract. One selector (`0x60fe47b1`) reads slot `0x0`, masks it to an address, and performs a low-level `CALL` with nonzero ETH value and no detected authorization check. The onl...
Top findings
  • medium Public entrypoint can force ETH transfer to the address stored in slot 0
  • low Low-level ETH call ignores success/failure

Code Metadata

fingerprint
Created block
247796
Code size
100
Codehash
0x202efbee42eee44310f93a805c5f525af954b640019ea8ba41f2ec5504be183e
Priority score
0.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b3836-2211-7274-9805-31a96cedf1d9 complete crit 0 high 2 4 3 months ago