TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xadd45159f83dada41bdd4b5c87fedafcccbdfbc6 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$62,035.49
last balance 3 months ago
ETH
2.0100
WETH
18.0014
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 4 total 4
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 2
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
medium detector Untrusted CALL target/value reachable no no
medium detector ETH value transfer possible no no
medium codex Allowlisted executor can perform arbitrary external CALLs with ETH value no
info cast Heavy EXTCODE*/BALANCE usage no

Codex

latest run
complete bytecode findings
One medium-risk issue: the allowlisted executor path can initiate external CALLs with computed targets and ETH value, so misconfiguration/compromise of the allowlist can drain contract-held assets.
Top findings
  • medium Allowlisted executor can perform arbitrary external CALLs with ETH value

Code Metadata

fingerprint
Created block
18374608
Code size
6373
Codehash
0x9c678aefe98667d61fb7a5c71c2fd70bb664f448b4510f0a3c1c1cf2beeb4ad8
Priority score
62035.490685

Recent Runs

last 20
Run ID Status Validated Total findings Created
019ba9e0-bde8-721d-81bf-cec45f1439c0 complete crit 0 high 0 4 3 months ago
019b477e-d329-71b2-837a-8f4ee6ffc91e complete crit 0 high 0 2 3 months ago