TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x91630f5e28f1f30067b92a8d9d7b8e836afddf9b checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 5 total 5
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
1
View top proxies
Workflow
checked
attempts 0
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
critical codex Unprotected initialize enables proxy hijack and full ETH drain no
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
info cast Heavy EXTCODE*/BALANCE usage no
info cast Heavy CALL-family usage no

Codex

latest run
complete findings
Unprotected proxy initializer lets an attacker set a malicious storage contract and drain all ETH via distributeWithdrawals if the proxy is not initialized atomically.
Top findings
  • critical Unprotected initialize enables proxy hijack and full ETH drain

Code Metadata

fingerprint
Created block
Code size
11195
Codehash
0xe2c0536e18ddbc44dc134f46c3e384167ef2246ed4ac106c3917f68a955361eb
Priority score
0.000000
Latest run id

Recent Runs

last 20
Run ID Status Validated Total findings Created
24348e6d-d2c2-4182-b020-1b80c138a33b complete crit 0 high 0 5 3 months ago