TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x8d12a197cb00d4747a1fe03395095ce2a5cc6819 failed chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$47,393,993.66
last balance 3 months ago
ETH
15,285.2920
WETH
0.0162
USDC
29.93
USDT
9,508.16
Findings Signal
2
confirmed findings
crit 0 high 2 unconfirmed 2 total 4
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
failed
attempts 3
checked 1 week ago
error solc version 0.4.9 is too old for supported toolchain

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable yes yes
high detector ETH value transfer possible yes yes
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high codex Phantom token deposits via malicious ERC20 let attacker trade unbacked balances for real assets no
info cast Heavy CALL-family usage no

Codex

latest run
complete findings
Found 1 concrete profit path: malicious ERC20s can mint internal balances and drain real assets via trades.
Top findings
  • high Phantom token deposits via malicious ERC20 let attacker trade unbacked balances for real assets

Code Metadata

fingerprint
Created block
3154196
Code size
6613
Codehash
0xa9b6174f541234c387da35a08050778319112c20ed38107f47f3a634fa752625
Priority score
47393993.657333

Recent Runs

last 20
Run ID Status Validated Total findings Created
c0d05ecc-5a14-4ce1-9cc4-2b103799055d failed crit 0 high 2 4 3 months ago
019b477e-a90c-719f-9941-a713f1026a3d failed crit 0 high 2 2 3 months ago
019b3844-825b-7377-9d40-6972fb5ead45 complete crit 0 high 2 2 3 months ago