TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xb92b054b9cc33685e7f8c3f85177c4b6dc061391 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$218,596.43
last balance 3 months ago
ETH
0.0000
WETH
70.5150
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 10 total 10
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable no no
high detector SELFDESTRUCT reachable no no
high cast SELFDESTRUCT present no
high detector ETH value transfer possible no no
medium codex External rate oracles / ERC4626 conversion feed directly into pricing without sanity bounds no
medium detector CREATE/CREATE2 reachable no no
low cast Contract creation opcode present no
low codex Negative rebases can underflow admin-fee accounting and brick pool no
info cast Heavy EXTCODE*/BALANCE usage no
info cast Heavy CALL-family usage no

Codex

latest run
complete findings
Found oracle-manipulation exposure in rate feeds and a rebasing-token accounting edge case that can DOS the pool.
Top findings
  • medium External rate oracles / ERC4626 conversion feed directly into pricing without sanity bounds
  • low Negative rebases can underflow admin-fee accounting and brick pool

Code Metadata

fingerprint
Created block
20091280
Code size
23635
Codehash
0xff0dc8233b03fb2754e5b0ebfd6f067437c3dce959e83edaeb98b34c17030541
Priority score
218596.426479

Recent Runs

last 20
Run ID Status Validated Total findings Created
b59a118d-c397-45af-8d13-1ddf618b6695 complete crit 0 high 0 10 3 months ago