TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xac514f05160d2723aa7fb27bf98abf347dd26d2d checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$3,100.00
last balance 3 months ago
ETH
1.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
2
confirmed findings
crit 0 high 2 unconfirmed 2 total 4
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable yes yes
high detector ETH value transfer possible yes yes
Show unconfirmed findings
Severity Tool Title Validated Confirmed
low codex `transfer` appears to return `false` even when balances are updated successfully no
low codex Recipient balance credit uses unchecked addition no

Codex

latest run
complete bytecode findings
Minimal ERC20-like runtime with selectors consistent with `name`, `symbol`, `decimals`, `balanceOf`, and `transfer`. I do not see proxy/admin/delegatecall logic. The detector-reported CALLs at `pc:0x168` and `pc:0x373` m...
Top findings
  • low `transfer` appears to return `false` even when balances are updated successfully
  • low Recipient balance credit uses unchecked addition

Code Metadata

fingerprint
Created block
560791
Code size
1140
Codehash
0xfa149e2aff43aa4f3d65196a108a0b9a8c6c4bf76e8f61e7e5bdca9cd35852c5
Priority score
3100.000310

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b3836-258e-70dc-8c36-57a18d72465b complete crit 0 high 2 4 3 months ago