TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xa037b01bf218e87144446e9e87dd9dc58033fb57 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 5 total 5
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
1
View top proxies
Workflow
checked
attempts 0
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
critical codex Unprotected initialize enables attacker-controlled messenger and bridge takeover no
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
info cast Heavy EXTCODE*/BALANCE usage no
info cast Heavy CALL-family usage no

Codex

latest run
complete findings
Unprotected initializer lets an attacker take over cross-domain auth and drain all ETH/ERC20 escrow if the proxy is deployed uninitialized.
Top findings
  • critical Unprotected initialize enables attacker-controlled messenger and bridge takeover

Code Metadata

fingerprint
Created block
Code size
7799
Codehash
0x6ef45b68e2bb84df827e25bef9a3e91998a20102262b8e8f9f1fdab021917205
Priority score
0.000000
Latest run id

Recent Runs

last 20
Run ID Status Validated Total findings Created
3fa32ee3-f6ed-4978-87cd-d4efcb7979e3 complete crit 0 high 0 5 3 months ago