TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xa18b0ca9806e4873aeaeef7d1e939856caf8bfd7 skipped chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 4 total 4
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
1
View top proxies
Workflow
skipped
attempts 0
checked 1 week ago
skip blacklisted_codehash

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
info cast Heavy EXTCODE*/BALANCE usage no
info cast Heavy CALL-family usage no

Codex

latest run
complete no findings
No concrete, exploitable profit path found in AUDIT_BUNDLE.txt: the only mutable contract is LRTDepositPool, and public entrypoints (depositETH/depositAsset/receive) do not expose a value-extraction bug absent an oracle...

Code Metadata

fingerprint
Created block
Code size
19476
Codehash
0x04b5724865c00a934acd7a432542949c3b455f42229660f7e622ea1bb297399c
Priority score
0.000000
Latest run id

Recent Runs

last 20
Run ID Status Validated Total findings Created
4a547fab-50c5-450f-b35a-24362ab3aeac failed crit 0 high 0 4 3 months ago