TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x85db6688de2c47c8acd5c4dff804e6d5740790e3 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$115,675.14
last balance 3 months ago
ETH
37.3146
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 9 total 9
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 3
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high codex Unprotected lazyInit lets attacker become host and drain treasury if uninitialized no
high detector Untrusted DELEGATECALL target reachable no no
high detector Authorization based on tx.origin no
medium detector ETH value transfer possible no no
medium detector CREATE/CREATE2 reachable no no
medium detector Untrusted CALL target/value reachable no no
medium cast DELEGATECALL present no
low cast Contract creation opcode present no
info cast Heavy EXTCODE*/BALANCE usage no

Codex

latest run
complete findings
Uninitialized TreasuryManager can be taken over via external lazyInit, enabling full drain of ETH/tokens/NFTs.
Top findings
  • high Unprotected lazyInit lets attacker become host and drain treasury if uninitialized

Code Metadata

fingerprint
Created block
13715690
Code size
10549
Codehash
0xbf15f5d7b5ebda4d64a3a601302909633f76746cfbc6cbbb098fa93c9af1adb9
Priority score
115675.137022

Recent Runs

last 20
Run ID Status Validated Total findings Created
a9587494-c8ca-4fe1-bb88-33128e0a544a complete crit 0 high 0 9 3 months ago
019b477e-c39d-70b7-91c6-9832efa9cd96 complete crit 0 high 0 5 3 months ago
019b3844-9e6c-70db-bde0-e34aeb2ba630 complete crit 0 high 0 5 3 months ago