TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x984f7dbd76286a9ce4c68ac84bb098c5fff3ed62 skipped chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 5 total 5
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
2
View top proxies
Workflow
skipped
attempts 0
checked 1 week ago
skip blacklisted_codehash

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
medium codex Fee collection can render refunds insolvent during the refund window no
low codex Implementation contract is not locked against direct initialization no
low codex Refund receiver can drain refund tokens at any time no

Codex

latest run
complete findings
Identified three issues: refund token recovery can drain refunds early, fee collection can make refunds insolvent during the refund window, and the upgradeable implementation is not locked against direct initialization.
Top findings
  • medium Fee collection can render refunds insolvent during the refund window
  • low Implementation contract is not locked against direct initialization
  • low Refund receiver can drain refund tokens at any time

Code Metadata

fingerprint
Created block
Code size
14077
Codehash
0x3b588defc4acf00be841162042013e5071131c35e22391b093dc9a31b501cdca
Priority score
0.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
72fea1d0-3553-473a-9b2b-ea4b0146f4e1 failed crit 0 high 0 2 3 months ago
73252535-2ea1-4a23-a722-3f8641951082 failed crit 0 high 0 5 3 months ago