TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xaf1745c0f8117384dfa5fff40f824057c70f2ed3 checked chain 1 proxy
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$221,466.65
last balance 3 months ago
ETH
0.0000
WETH
71.4409
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 4 total 4
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 2
checked 3 months ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high codex Reentrant token transfer allows repeated withdrawals before balance update no
high detector ETH value transfer possible no no
high detector Untrusted CALL target/value reachable no no
info cast Heavy EXTCODE*/BALANCE usage no

Codex

latest run
complete findings
Found a reentrancy path in `withdraw` that lets an attacker drain the full balance of any reentrant token (ERC777/223/malicious ERC20) held by the exchange.
Top findings
  • high Reentrant token transfer allows repeated withdrawals before balance update

Code Metadata

fingerprint
Created block
5875590
Code size
253
Codehash
0x701c4ee78af35339d112aee582e1343446cec98c557357d38b7f9c10d2bde02b
Impl codehash
0xc272d11f61cf8b7ceeddb9e74473d87c5d0bf0b0f7952e2ccb8e21296f92a444
Priority score
221466.649237

Recent Runs

last 20
Run ID Status Validated Total findings Created
No runs yet.