TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xa7d9e842efb252389d613da88eda3731512e40bd checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$801,526.50
last balance 3 months ago
ETH
258.5569
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
1
confirmed findings
crit 0 high 0 unconfirmed 7 total 8
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 3
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
medium detector CREATE/CREATE2 reachable yes yes
Show unconfirmed findings
Severity Tool Title Validated Confirmed
critical codex TokenGrant.receiveApproval allows arbitrary grant creation using victims’ allowances, enabling immediate token theft no
high detector Authorization based on tx.origin no
medium detector ETH value transfer possible no no
medium detector Untrusted CALL target/value reachable no no
low cast Contract creation opcode present no
info cast Heavy EXTCODE*/BALANCE usage no
info cast Heavy CALL-family usage no

Codex

latest run
complete findings
Critical auth bypass in TokenGrant.receiveApproval lets an attacker steal KEEP from any address that has approved the TokenGrant contract.
Top findings
  • critical TokenGrant.receiveApproval allows arbitrary grant creation using victims’ allowances, enabling immediate token theft

Code Metadata

fingerprint
Created block
10860168
Code size
7850
Codehash
0x8168880cb0d324919f5c6c3d42d8a4539db02e0e83e05b96da4f41f490d6e6cf
Priority score
801526.495125

Recent Runs

last 20
Run ID Status Validated Total findings Created
27854931-6298-47ab-a143-fe61a05b0147 complete crit 0 high 0 8 3 months ago
019b477e-b9dd-737c-a634-dca038b61b7c complete crit 0 high 0 4 3 months ago
019b3844-96b5-70c7-a931-70592649424f complete crit 0 high 0 4 3 months ago