TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xa9d1e08c7793af67e9d92fe308d5697fb81d3e43 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$144,278,839.16
last balance 3 months ago
ETH
10,532.4220
WETH
0.0223
USDC
84,099,258.58
USDT
27,529,003.09
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 4 total 4
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 3
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
medium detector CREATE/CREATE2 reachable no no
low cast Contract creation opcode present no
From run 60ed7a90-3d7b-4616-abba-573f64440894 suppressed 1 initializer finding view all

Codex

latest run
complete findings
Unprotected initializer allows anyone to seize owner/controller roles when the init flag is unset, enabling arbitrary ETH/ERC20 transfers via controller-only batch calls.

Code Metadata

fingerprint
Created block
15148951
Code size
6889
Codehash
0xa4497f4402e130b2043ab62721736fb12182e744d7df2c905a5ac98ab04e6b32
Priority score
144278839.159642

Recent Runs

last 20
Run ID Status Validated Total findings Created
60ed7a90-3d7b-4616-abba-573f64440894 complete crit 0 high 0 5 3 months ago
019b477e-c9f0-72b2-861a-1d6828c30aec complete crit 0 high 0 3 3 months ago
019b3844-a345-73bc-8240-e064fd279743 complete crit 0 high 0 3 3 months ago