TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xa92299289361fdcbb4ce9acbb512a84bd5fab37d skipped chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 6 total 6
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
1
View top proxies
Workflow
skipped
attempts 0
checked 1 week ago
skip blacklisted_codehash

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
low codex Withdrawal cooldown bypassable via LP token transfers no
info codex LP token admin can grant VAULT_ROLE and mint unbacked shares no
info cast Heavy EXTCODE*/BALANCE usage no
info cast Heavy CALL-family usage no

Codex

latest run
complete findings
Identified a low-severity cooldown bypass when LP transfers are enabled and an informational privileged-role risk around vault-token minting.
Top findings
  • low Withdrawal cooldown bypassable via LP token transfers
  • info LP token admin can grant VAULT_ROLE and mint unbacked shares

Code Metadata

fingerprint
Created block
Code size
14925
Codehash
0xfca86ddba80358e4805e10f0504a79ea0bd27737ddc7fc76b92404af1986eebf
Priority score
0.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
9b0dd247-e062-45bc-b56f-51c147899fd4 failed crit 0 high 0 4 3 months ago
09655295-9ca8-4866-aeae-e0cd31e478e3 failed crit 0 high 0 6 3 months ago