TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0x9e021c9607bd3adb7424d3b25a2d35763ff180bb checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 8 total 8
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
1
View top proxies
Workflow
checked
attempts 0
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
critical codex Unprotected initialize allows proxy takeover and unlimited minting no
high detector Authorization based on tx.origin no
medium detector ETH value transfer possible no no
medium detector CREATE/CREATE2 reachable no no
medium detector Untrusted CALL target/value reachable no no
medium codex initializeV2_1 lets anyone sweep the contract’s own token balance no
low cast Contract creation opcode present no
info cast Heavy EXTCODE*/BALANCE usage no

Codex

latest run
complete findings
Two upgrade-time access-control gaps can lead to direct value extraction if an attacker reaches initialization first: the base initializer can be hijacked to gain minting power, and the v2.1 initializer can redirect the...
Top findings
  • critical Unprotected initialize allows proxy takeover and unlimited minting
  • medium initializeV2_1 lets anyone sweep the contract’s own token balance

Code Metadata

fingerprint
Created block
Code size
23068
Codehash
0xbf97f39f9744bdbaa67bef58cf0002c9efd2179a97ebde4486bc493b4aea2593
Priority score
0.000000
Latest run id

Recent Runs

last 20
Run ID Status Validated Total findings Created
e0b6a8c2-69a3-42d6-9367-2fd03f2174f9 complete crit 0 high 0 8 3 months ago