TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xbb9bc244d798123fde783fcc1c72d3bb8c189413 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$142,099.48
last balance 3 months ago
ETH
45.8385
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 6 total 6
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 3
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
critical codex Reentrant splitDAO via withdrawRewardFor drains the main DAO balance no
high codex Reentrant getMyReward drains rewardAccount no
high codex Reentrant refund drains all funds if token creation fails no
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
info cast Heavy CALL-family usage no

Codex

latest run
complete findings
Found three concrete reentrancy paths that can drain the DAO's main balance, the reward pool, or failed-creation refunds.
Top findings
  • critical Reentrant splitDAO via withdrawRewardFor drains the main DAO balance
  • high Reentrant getMyReward drains rewardAccount
  • high Reentrant refund drains all funds if token creation fails

Code Metadata

fingerprint
Created block
1428757
Code size
10838
Codehash
0x6a5d24750f78441e56fec050dc52fe8e911976485b7472faac7464a176a67caa
Priority score
142099.477639

Recent Runs

last 20
Run ID Status Validated Total findings Created
839a0dce-7e4a-416f-a10e-f6ca70c4e5cb complete crit 0 high 0 6 3 months ago
019b477e-a7ed-722e-8904-5b893e5d1163 complete crit 0 high 0 2 3 months ago
019b3836-3e1e-7157-8414-5ff0cc25c67d complete crit 0 high 0 2 3 months ago