TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x8cfec459f62055ed3104a577c6613522c10b55c4 skipped chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 2 total 2
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
1
View top proxies
Workflow
skipped
attempts 0
checked 1 week ago
skip blacklisted_codehash

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
medium detector Untrusted CALL target/value reachable no no
medium detector ETH value transfer possible no no
From run b204c673-73d8-4a76-b490-0df979244afc suppressed 1 initializer finding view all

Codex

latest run
complete findings
Found a high-severity initialization/upgradeability issue that can allow ownership takeover if deployment is not atomically initialized.

Code Metadata

fingerprint
Created block
Code size
13988
Codehash
0x93af8ef99637aeb1a17f2f1468a394570e8ff194522f28ff71dfaf1a36818a5f
Priority score
0.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
1d5adcec-31ea-42e6-ab6d-35484a708df8 failed crit 0 high 0 2 3 months ago
b204c673-73d8-4a76-b490-0df979244afc failed crit 0 high 0 3 3 months ago