TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xb542d5cb34ef265fb87c170181127332f7797369 skipped chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 9 total 9
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Workflow
skipped
attempts 0
checked 1 week ago
skip blacklisted_codehash

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high cast SELFDESTRUCT present no
high detector Authorization based on tx.origin no
medium detector CREATE/CREATE2 reachable no no
medium detector SELFDESTRUCT reachable no no
medium detector Untrusted CALL target/value reachable no no
medium detector ETH value transfer possible no no
low cast Contract creation opcode present no
info cast Heavy CALL-family usage no
info cast Heavy EXTCODE*/BALANCE usage no
From run 57607431-8897-4c7e-aa5c-98624726087b suppressed 1 initializer finding view all

Codex

latest run
complete findings
1 high-severity issue found: the initializer is externally callable without access control, enabling full manager takeover if deployment is not atomically initialized.

Code Metadata

fingerprint
Created block
Code size
24480
Codehash
0x49714ba99ebd10bc1583b28ab2c2da6ea28532e1bcfc74a86734ab19ca483d85
Priority score
0.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
b8b4ee5d-328f-44fc-a35e-3ed243053455 failed crit 0 high 0 9 3 months ago
57607431-8897-4c7e-aa5c-98624726087b failed crit 0 high 0 10 3 months ago