TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xae7ab96520de3a18e5e111b5eaab095312d7fe84 checked chain 1 proxy
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$1,501,061.17
last balance 3 months ago
ETH
478.2753
WETH
0.0015
USDC
11,726.17
USDT
6,676.94
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 8 total 8
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 3
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
critical codex Unprotected finalizeUpgrade_v2 enables LidoLocator hijack and buffered ETH theft no
high detector Authorization based on tx.origin no
medium detector ETH value transfer possible no no
medium detector CREATE/CREATE2 reachable no no
medium detector Untrusted CALL target/value reachable no no
low cast Contract creation opcode present no
info cast Heavy EXTCODE*/BALANCE usage no
info cast Heavy CALL-family usage no

Codex

latest run
complete findings
Critical access-control gap in `finalizeUpgrade_v2` lets an attacker hijack LidoLocator during a v1→v2 upgrade window and drain buffered ETH.
Top findings
  • critical Unprotected finalizeUpgrade_v2 enables LidoLocator hijack and buffered ETH theft

Code Metadata

fingerprint
Created block
11473216
Code size
1035
Codehash
0xb9c1c929064cd21734c102a698e68bf617feefcfa5a9f62407c45401546736bf
Impl codehash
0x9da2a3dadf3a39f99886a2958f2c239bf663d39b766e2eb13e37d9c73500a9d0
Priority score
1501061.171774

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b477e-bba5-71db-9fb8-2d44b96d4c11 complete crit 0 high 0 3 3 months ago
019b3844-97b0-739d-be5f-e6bf65914e95 complete crit 0 high 0 3 3 months ago