TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x998d7b14c123c1982404562b68eddb057b0477cb checked chain 1 proxy
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$797,640.59
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
797,640.59
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 5 total 5
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 2
checked 3 months ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
medium codex Pending withdrawal fees are not reserved until claim, allowing LPs to reclaim them via instant redemption no
info cast Heavy EXTCODE*/BALANCE usage no
info cast Heavy CALL-family usage no

Codex

latest run
complete findings
Found 1 exploitable fee-skimming path that lets LPs bypass scheduled withdrawal fees and capture them via instant redemption before claims are processed.
Top findings
  • medium Pending withdrawal fees are not reserved until claim, allowing LPs to reclaim them via instant redemption

Code Metadata

fingerprint
Created block
23118957
Code size
2001
Codehash
0x8a849ca1898c415c7122c1cbc252df3244698f3d3dd9f5617d4627249b6553a6
Impl codehash
0xe065055018b6e218ab905146c5fe7ba249ea68fc4ec0db4ae29cbf392d115883
Priority score
797640.592758

Recent Runs

last 20
Run ID Status Validated Total findings Created
No runs yet.