TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x9c9e98aba397c49e03ee2e4cf11c0effb8cc8135 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.97
last balance 3 months ago
ETH
0.0003
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
2
confirmed findings
crit 0 high 2 unconfirmed 2 total 4
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable yes yes
high detector ETH value transfer possible yes yes
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high codex Unauthenticated record creation can steer later ETH payouts no
medium codex Payout path appears replayable and reentrancy-prone no

Codex

latest run
complete bytecode findings
Bytecode-only analysis suggests this contract maintains a global record table and exposes a public ETH-transfer path. The strongest issues are missing access control around record mutation/payout setup and a payout routi...
Top findings
  • high Unauthenticated record creation can steer later ETH payouts
  • medium Payout path appears replayable and reentrancy-prone

Code Metadata

fingerprint
Created block
999143
Code size
1125
Codehash
0x078cf294923eed7f9d62fcfb884dae4ce7252a87bff75c9aa2ecc6111f8d32b5
Priority score
0.971447

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b3836-2e59-708d-99c9-3db04a41b280 complete crit 0 high 2 4 3 months ago