TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x87adf4d3e1eb630d41405c6ea5c0021c5b6614ff checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$1.55
last balance 3 months ago
ETH
0.0005
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
2
confirmed findings
crit 0 high 2 unconfirmed 1 total 3
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable yes yes
high detector ETH value transfer possible yes yes
Show unconfirmed findings
Severity Tool Title Validated Confirmed
low codex Contract accepts ETH with no visible recovery path no

Codex

latest run
complete bytecode findings
The bytecode does not show a proxy/delegatecall surface, and the detector-reported CALL at pc:0x195 appears to be the standard identity-precompile copy path used when returning dynamic strings rather than a user-controll...
Top findings
  • low Contract accepts ETH with no visible recovery path

Code Metadata

fingerprint
Created block
522048
Code size
624
Codehash
0xa81094f2cc770c7af4e87578dfd47661017af78a25faf932e2cde89931a52dc5
Priority score
1.550000

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b3836-24ca-7168-9a2d-3c548ff7765c complete crit 0 high 2 3 3 months ago