TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x8d1fa828e0b99f2cd9bec6c51ff11e97b502db8a checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 4 total 4
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
1
View top proxies
Workflow
checked
attempts 0
checked 3 months ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
high slither TimelockControllerUpgradeable._execute(address,uint256,bytes) (@openzeppelin/contracts-upgradeable/governance/TimelockControllerUpgradeable.sol#348-355) sends eth to arbitrary user no
high slither Reentrancy in TimelockControllerUpgradeable.executeBatch(address[],uint256[],bytes[],bytes32,bytes32) (@openzeppelin/contracts-upgradeable/governance/TimelockControllerUpgradeab... no
From run 019bab3b-fcd0-7290-bd8b-dd7b4bf015df suppressed 1 initializer finding view all

Codex

latest run
complete source findings
Public initializer allows anyone to set timelock roles if the proxy is left uninitialized.

Code Metadata

fingerprint
Created block
Code size
8784
Codehash
0x7f125509de6b97fed3ba5c1e52d408fbf8320c2981b17e39e75fa3d943d6898d
Priority score
0.000000
Latest run id

Recent Runs

last 20
Run ID Status Validated Total findings Created
019bab3b-fcd0-7290-bd8b-dd7b4bf015df complete crit 0 high 0 5 3 months ago