TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x9b1e3948d22a1a56b2c49154c8768b3826d565dc checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$310.00
last balance 3 months ago
ETH
0.1000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
2
confirmed findings
crit 0 high 2 unconfirmed 2 total 4
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable yes yes
high detector ETH value transfer possible yes yes
Show unconfirmed findings
Severity Tool Title Validated Confirmed
medium codex `transfer` decodes calldata without a length check no
low codex Fallback path appears to accept ETH and likely traps it permanently no

Codex

latest run
complete bytecode findings
Reviewed BYTECODE_BUNDLE.json. The runtime matches an old non-proxy token-style contract with selectors consistent with `name`, `symbol`, `decimals`, `balanceOf`, and `transfer`. The only observed `CALL` at `pc:0x1a7` is...
Top findings
  • medium `transfer` decodes calldata without a length check
  • low Fallback path appears to accept ETH and likely traps it permanently

Code Metadata

fingerprint
Created block
1378009
Code size
713
Codehash
0x000d13dda2843fe929be00661f96552e3f1e851c177f0c270f65088f35b0c09b
Priority score
310.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b3836-3c58-7035-a958-137635a8c9c1 complete crit 0 high 2 4 3 months ago