TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x927a83c679a5e1a6435d6bfaef7f20d4db23e2cc skipped chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 11 total 11
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Workflow
skipped
attempts 0
checked 1 week ago
skip blacklisted_codehash
error slither failed (exit 1): 'forge clean' running (wd: /tmp/slither-t15xoe7h) 'forge config --json' running 'forge build --build-info --skip ./test/** ./script/** --force' running (wd: /tmp/slither-t15xoe7h) 'forge' returned non-zero exit code 1 Error: Encountered invalid solc version in lib/openzeppelin-contracts/contracts/utils/cryptography/MessageHashUtils.sol: No solc version exists that matches the version requirement: ^0.8.24 stderr: Encountered invalid solc version in lib/openzeppelin-contracts/contracts/utils/cryptography/MessageHashUtils.sol: No solc version exists that matches the version requirement: ^0.8.24 stderr: Encountered invalid solc version in lib/openzeppelin-contracts/contracts/utils/cryptography/MessageHashUtils.sol: No solc version exists that matches the version requirement: ^0.8.24 stderr: Encountered invalid solc version in lib/openzeppelin-contracts/contracts/utils/cryptography/MessageHashUtils.sol: No solc version exists that matches the version requirement: ^0.8.24 Traceback (most recent call last): File "/var/www/tripwire/.venv/bin/slither", line 10, in <module> sys.exit(main()) ~~~~^^ File "/var/www/tripwire/.venv/lib/python3.13/site-packages/slither/__main__.py", line 776, in main main_impl(all_detector_classes=detectors, all_printer_classes=printers) ~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/var/www/tripwire/.venv/lib/python3.13/site-packages/slither/__main__.py", line 882, in main_impl ) = process_all(filename, args, detector_classes, printer_classes) ~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/var/www/tripwire/.venv/lib/python3.13/site-packages/slither/__main__.py", line 96, in process_all compilations = compile_all(target, **vars(args)) File "/var/www/tripwire/.venv/lib/python3.13/site-packages/crytic_compile/crytic_compile.py", line 722, in compile_all compilations.append(CryticCompile(target, **kwargs)) ~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^ File "/var/www/tripwire/.venv/lib/python3.13/site-packages/crytic_compile/crytic_compile.py", line 211, in __init__ self._compile(**kwargs) ~~~~~~~~~~~~~^^^^^^^^^^ File "/var/www/tripwire/.venv/lib/python3.13/site-packages/crytic_compile/crytic_compile.py", line 633, in _compile self._platform.compile(self, **kwargs) ~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^ File "/var/www/tripwire/.venv/lib/python3.13/site-packages/crytic_compile/platform/foundry.py", line 102, in compile hardhat_like_parsing( ~~~~~~~~~~~~~~~~~~~~^ crytic_compile, str(self._target), build_directory, str(self._project_root) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ) ^ File "/var/www/tripwire/.venv/lib/python3.13/site-packages/crytic_compile/platform/hardhat.py", line 52, in hardhat_like_parsing raise InvalidCompilation(txt) crytic_compile.platform.exceptions.InvalidCompilation: Compilation failed. Can you run build command? /tmp/slither-t15xoe7h/out/build-info is not a directory.

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high codex Admin rescueAssets can withdraw unclaimed exit assets once vault is uncollateralized no
high detector Authorization based on tx.origin no
high detector Untrusted DELEGATECALL target reachable no no
medium detector ETH value transfer possible no no
medium detector CREATE/CREATE2 reachable no no
medium codex Validators manager signatures are replayable in registerValidators (nonce not enforced) no
medium detector Untrusted CALL target/value reachable no no
medium cast DELEGATECALL present no
low cast Contract creation opcode present no
info cast Heavy CALL-family usage no
info cast Heavy EXTCODE*/BALANCE usage no

Codex

latest run
complete source findings
Found two exploitable issues: replayable validators-manager signatures in validator registration and an admin rescue path that can sweep unclaimed exit assets after uncollateralization.
Top findings
  • high Admin rescueAssets can withdraw unclaimed exit assets once vault is uncollateralized
  • medium Validators manager signatures are replayable in registerValidators (nonce not enforced)

Code Metadata

fingerprint
Created block
Code size
19550
Codehash
0xe6381554eb02cdb8fa2814920f1af952ed1580d43877f357045910fbad0ea20f
Priority score
0.000000
Latest run id

Recent Runs

last 20
Run ID Status Validated Total findings Created
019bab3c-4a33-7098-9325-ebfbff005bf9 failed crit 0 high 0 11 3 months ago
7d321649-44f5-4bbc-ae4d-dd3561dfb0bf failed crit 0 high 0 9 3 months ago