TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x98f66626d9ddb4688ef7aed01e32375d04ca1f7d checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$21.80
last balance 3 months ago
ETH
0.0070
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
2
confirmed findings
crit 0 high 2 unconfirmed 4 total 6
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable yes yes
high detector ETH value transfer possible yes yes
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector SELFDESTRUCT reachable no no
high codex Public entrypoints can trigger non-zero-value external calls from contract balance no
medium codex Oracle/provider selection is publicly reconfigurable no
low codex Privileged kill-switch can selfdestruct the contract and sweep ETH no

Codex

latest run
complete bytecode findings
Bytecode-only review found unauthenticated ETH-spending external call paths, public reconfiguration of the oracle/provider target, and an owner-gated SELFDESTRUCT. Selector names are inferred only from raw selectors, so...
Top findings
  • high Public entrypoints can trigger non-zero-value external calls from contract balance
  • medium Oracle/provider selection is publicly reconfigurable
  • low Privileged kill-switch can selfdestruct the contract and sweep ETH

Code Metadata

fingerprint
Created block
848441
Code size
2048
Codehash
0x3ca4c006b81d9b9302a6d69942deb01995e8941f531ce8027e29828f14d7f199
Priority score
21.802573

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b3836-2901-713f-8003-3b6a8dabb217 complete crit 0 high 2 6 3 months ago