TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xb203e1170a30e68dc5b20aac08aa42619842c79e checked chain 1 proxy
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$168,415,035.24
last balance 3 months ago
ETH
38,685.8227
WETH
0.0000
USDC
0.00
USDT
48,488,985.01
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 3 total 3
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 3
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high codex executeTxWithPermits allows reentrant double-execution of the same transaction no
high detector ETH value transfer possible no no
high detector Untrusted CALL target/value reachable no no

Codex

latest run
complete findings
Found a reentrancy in permit-based execution that lets a malicious owner contract double-spend an approved transfer.
Top findings
  • high executeTxWithPermits allows reentrant double-execution of the same transaction

Code Metadata

fingerprint
Created block
15887437
Code size
2124
Codehash
0x21cafb020760f864b3a478268931c97244fa722e9ea56cd2c3558392280eb586
Impl codehash
0xe55185749ac9386313a95ddd545bdf19ca95a9f359835e93ae997e4b544706b3
Priority score
168415035.235903

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b477e-cc9e-72a8-bff7-c97ff1bd8b59 complete crit 0 high 0 1 3 months ago
019b3844-a4f1-737c-a109-d0e0b571eefe complete crit 0 high 0 1 3 months ago