TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xa57eda20be51ae07df3c8b92494c974a92cf8956 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$43,551.19
last balance 3 months ago
ETH
0.0000
WETH
14.0488
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 9 total 9
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 2 months ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Authorization based on tx.origin no
medium detector ETH value transfer possible no no
medium codex Authorization uses tx.origin (phishable auth bypass) no
medium detector Untrusted CALL target/value reachable no no
medium detector CREATE/CREATE2 reachable no no
low cast Contract creation opcode present no
low codex External CALLs with computed target/value (potential untrusted call / reentrancy surface) no
info cast Heavy EXTCODE*/BALANCE usage no
info cast Heavy CALL-family usage no

Codex

latest run
complete bytecode findings
Identified 2 potential issues from bytecode analysis: tx.origin-based authorization checks and multiple external CALL sites with computed targets/values (possible untrusted calls/ETH transfer with reentrancy risk). Evide...
Top findings
  • medium Authorization uses tx.origin (phishable auth bypass)
  • low External CALLs with computed target/value (potential untrusted call / reentrancy surface)

Code Metadata

fingerprint
Created block
20834635
Code size
8705
Codehash
0xbcd0fefbb2d5702ae2871df670831904dd5b366ed4a32d6e06aec0a9e930be8e
Priority score
43551.192425

Recent Runs

last 20
Run ID Status Validated Total findings Created
019c0ea9-0927-724a-89b6-62611e7a5660 complete crit 0 high 0 9 2 months ago