TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xa5cafcf5a58c1b5f9c2b9c7d904fce3585a2d2c0 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$310.00
last balance 3 months ago
ETH
0.1000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
2
confirmed findings
crit 0 high 2 unconfirmed 2 total 4
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
high detector ETH value transfer possible yes yes
high detector Untrusted CALL target/value reachable yes yes
Show unconfirmed findings
Severity Tool Title Validated Confirmed
medium codex Allowance accounting is nonstandard and can break ERC20 approval invariants no
low codex `approveAndCall` performs an untrusted callback after writing approval state no

Codex

latest run
complete bytecode findings
Bytecode matches a non-proxy ERC20-like token with custom `version()`, `approveAndCall(address,uint256,bytes)`, and an extra allowance-related view. The strongest issue is nonstandard allowance accounting: `transferFrom`...
Top findings
  • medium Allowance accounting is nonstandard and can break ERC20 approval invariants
  • low `approveAndCall` performs an untrusted callback after writing approval state

Code Metadata

fingerprint
Created block
1281091
Code size
1752
Codehash
0xd2d6c3ecadc70a6be8e1435fc3f34d92a3eb1c4eec8df279b9409eae0f868877
Priority score
310.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b3836-39c4-7362-8ad4-f82efcfdfaf7 complete crit 0 high 2 4 3 months ago