TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x965983977c29158ec53a296a6f47be145ddecc36 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 20 total 20
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
1
View top proxies
Workflow
checked
attempts 0
checked 2 months ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high slither TruthBridge.uniswapV3SwapCallback(int256,int256,bytes) (contracts/TruthBridge.sol#341-349) ignores return value by IERC20(usdc).transfer(msg.sender,uint256(amount0Delta)) (contr... no
high codex Relayer refund can be reentered to withdraw multiple times no
high detector Untrusted DELEGATECALL target reachable no no
high slither TruthBridge.relayerLift(uint256,uint256,address,uint8,bytes32,bytes32,bool) (contracts/TruthBridge.sol#289-304) uses arbitrary from in transferFrom in combination with permit: I... no
high slither TruthBridge.relayerLower(uint256,bytes,bool) (contracts/TruthBridge.sol#308-329) ignores return value by IERC20(usdc).transfer(user,amount) (contracts/TruthBridge.sol#323-324) no
high slither TruthBridge.relayerLift(uint256,uint256,address,uint8,bytes32,bytes32,bool) (contracts/TruthBridge.sol#289-304) ignores return value by IERC20(usdc).transferFrom(user,address(th... no
high slither TruthBridge.deregisterRelayer(address) (contracts/TruthBridge.sol#276-285) ignores return value by IERC20(usdc).transfer(relayer,uint256(balance - 1)) (contracts/TruthBridge.sol... no
medium slither Reentrancy in TruthBridge.relayerLower(uint256,bytes,bool) (contracts/TruthBridge.sol#308-329): no
medium codex Author confirmations and lower proofs lack domain separation (replayable signatures) no
medium slither Reentrancy in TruthBridge.relayerLift(uint256,uint256,address,uint8,bytes32,bytes32,bool) (contracts/TruthBridge.sol#289-304): no
medium slither Reentrancy in TruthBridge.relayerLower(uint256,bytes,bool) (contracts/TruthBridge.sol#308-329): no
medium slither Reentrancy in TruthBridge.relayerLift(uint256,uint256,address,uint8,bytes32,bytes32,bool) (contracts/TruthBridge.sol#289-304): no
medium cast DELEGATECALL present no
medium detector Untrusted CALL target/value reachable no no
medium detector ETH value transfer possible no no
low codex Pause bypass for relayer operations no
low codex Chainlink price used without sanity or staleness checks no
low codex Unchecked ERC20 transfer return values no
info cast Heavy CALL-family usage no
info cast Heavy EXTCODE*/BALANCE usage no

Codex

latest run
complete source findings
Found a high-severity reentrancy in the relayer refund flow and replayable author/lower signatures; also noted pause bypass, oracle safety gaps, and unchecked transfer returns.
Top findings
  • high Relayer refund can be reentered to withdraw multiple times
  • medium Author confirmations and lower proofs lack domain separation (replayable signatures)
  • low Pause bypass for relayer operations

Code Metadata

fingerprint
Created block
Code size
21558
Codehash
0x397e99bea8ea73a4ffcc65ee198aec38175360468da13ded1de8e005aaab8c99
Priority score
0.000000
Latest run id

Recent Runs

last 20
Run ID Status Validated Total findings Created
019c0ea9-e35a-710a-b93e-e2ba664180fb complete crit 0 high 0 20 2 months ago