TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xad24fc773e125edb223c38a39657cb64bc7c178e checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$152,873.52
last balance 3 months ago
ETH
0.0000
WETH
49.3140
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 5 total 5
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
critical codex Multicall delegatecalls let callers spoof immutable args (token addresses/scales), enabling asset drainage no
critical detector Untrusted DELEGATECALL target reachable no no
medium cast DELEGATECALL present no
low codex `initialize` is permissionless and can be front‑run no
info cast Likely proxy-like runtime no

Codex

latest run
complete findings
Identified a critical multicall/immutable‑args spoofing vector that can lead to asset loss, plus a low‑severity initialization access‑control risk.
Top findings
  • critical Multicall delegatecalls let callers spoof immutable args (token addresses/scales), enabling asset drainage
  • low `initialize` is permissionless and can be front‑run

Code Metadata

fingerprint
Created block
17664706
Code size
182
Codehash
0x7d417731f263b0c07af2af6b59a4f956d7ff46c07babf40087b5746154dbc202
Priority score
152873.516488

Recent Runs

last 20
Run ID Status Validated Total findings Created
0b182317-6fc8-49be-9b05-708e9dfa9460 complete crit 0 high 0 5 3 months ago