TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x8abf5358a88ca2586635d646aaaff172572fb0ed skipped chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 6 total 6
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Workflow
skipped
attempts 0
checked 1 week ago
skip blacklisted_codehash

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
medium codex Oracle price feeds directly set strike/premium/exercise costs without added integrity checks no
low codex RFQ/mint options lack strike/expiry validation, enabling underflow and unexercisable options no
info cast Heavy EXTCODE*/BALANCE usage no
info cast Heavy CALL-family usage no

Codex

latest run
complete findings
Found 2 issues: RFQ/mint initializers accept invalid option parameters that can brick exercise/borrow, and oracle price inputs are trusted without additional integrity checks.
Top findings
  • medium Oracle price feeds directly set strike/premium/exercise costs without added integrity checks
  • low RFQ/mint options lack strike/expiry validation, enabling underflow and unexercisable options

Code Metadata

fingerprint
Created block
Code size
18779
Codehash
0x61b64298a2520a356597496979d93a1530b4140ad148a7842ca5461992c2e9ea
Priority score
0.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
de19212d-681e-48f6-baae-84f5aaaa5c16 failed crit 0 high 0 4 3 months ago
3cda34f9-1fd9-4a06-ad4d-43dfafce2985 failed crit 0 high 0 6 3 months ago
f5e42a86-2af2-44b4-88c7-d11e26872a6a failed crit 0 high 0 7 3 months ago