TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xa249ee8255df0aa00a15262b16bca3efd66c3e4c checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$60,260.56
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
42,246.78
USDT
18,013.78
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 13 total 13
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 3 months ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Authorization based on tx.origin no
high slither StablesPool.safeBsdTransfer(address,uint256) (contracts/Contract.sol#676-685) ignores return value by bsd.transfer(_to,_bsdBal) (contracts/Contract.sol#682-683) no
high slither StablesPool.safeBsdTransfer(address,uint256) (contracts/Contract.sol#676-685) ignores return value by bsd.transfer(_to,_amount) (contracts/Contract.sol#683-684) no
medium slither Reentrancy in StablesPool.withdraw(uint256,uint256) (contracts/Contract.sol#645-665): no
medium codex Emergency withdrawal transfers before zeroing balances no
medium slither Reentrancy in StablesPool.deposit(uint256,uint256) (contracts/Contract.sol#626-645): no
medium slither Reentrancy in StablesPool.withdraw(uint256,uint256) (contracts/Contract.sol#645-665): no
medium slither Reentrancy in StablesPool.emergencyWithdraw(uint256) (contracts/Contract.sol#666-674): no
medium detector Untrusted CALL target/value reachable no no
medium detector ETH value transfer possible no no
medium codex Reward payout before state update enables reentrancy double-claims no
low codex Unchecked ERC20 return values on reward transfers no
info cast Heavy EXTCODE*/BALANCE usage no

Codex

latest run
complete source findings
Found reentrancy surfaces around reward payouts and emergency withdrawals, plus unchecked reward token transfers that can desync accounting.
Top findings
  • medium Emergency withdrawal transfers before zeroing balances
  • medium Reward payout before state update enables reentrancy double-claims
  • low Unchecked ERC20 return values on reward transfers

Code Metadata

fingerprint
Created block
11461836
Code size
6745
Codehash
0x9327fa2966cc310f08867a518c2608d15343b7f06722037637beae0f6e3583a6
Priority score
60260.556831

Recent Runs

last 20
Run ID Status Validated Total findings Created
019bab3b-aa19-71a6-879c-a96e48ff592a complete crit 0 high 0 13 3 months ago