TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x8ba5325a98147d67e5ee09bb0273194c68512612 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$43,534.33
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
43,534.33
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 12 total 12
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 2 months ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high slither Pool.safeRewardTransfer(address,uint256) (contracts/Contract.sol#1269-1276) ignores return value by rewardToken.transfer(_to,balance) (contracts/Contract.sol#1272-1273) no
high slither Pool.safeRewardTransfer(address,uint256) (contracts/Contract.sol#1269-1276) ignores return value by rewardToken.transfer(_to,_amount) (contracts/Contract.sol#1273-1276) no
high detector Authorization based on tx.origin no
high codex Pool can be permanently bricked after endBlock due to underflow in reward calculation no
medium detector Untrusted CALL target/value reachable no no
medium detector ETH value transfer possible no no
medium slither Reentrancy in Pool.withdraw(uint256,uint256) (contracts/Contract.sol#1255-1269): no
medium codex Reentrancy in deposit via untrusted pool tokens can double-claim rewards no
medium slither Reentrancy in Pool.deposit(uint256,uint256) (contracts/Contract.sol#1237-1255): no
medium slither Reentrancy in Pool.updatePool(uint256) (contracts/Contract.sol#1207-1221): no
low codex Fee-on-transfer/rebasing tokens break accounting and reward distribution no
info cast Heavy EXTCODE*/BALANCE usage no

Codex

latest run
complete source findings
Found 3 issues: reward calculation underflows after endBlock and can lock withdrawals; deposit can be reentered via ERC777/malicious pool tokens; fee-on-transfer/rebasing tokens break accounting and rewards.
Top findings
  • high Pool can be permanently bricked after endBlock due to underflow in reward calculation
  • medium Reentrancy in deposit via untrusted pool tokens can double-claim rewards
  • low Fee-on-transfer/rebasing tokens break accounting and reward distribution

Code Metadata

fingerprint
Created block
12379380
Code size
9655
Codehash
0x8a4c5242008e3dff906e8b5285e9f6a180e9cb216894ae87cc92ee7c1de87ded
Priority score
43534.334290

Recent Runs

last 20
Run ID Status Validated Total findings Created
019c0ea9-0936-7262-bcf9-9ef5de23bf57 complete crit 0 high 0 12 2 months ago