TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xbda109309f9fafa6dd6a9cb9f1df4085b27ee8ef failed chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$43,734,589.13
last balance 3 months ago
ETH
0.0000
WETH
14,107.9320
USDC
0.00
USDT
0.00
Findings Signal
2
confirmed findings
crit 0 high 2 unconfirmed 4 total 6
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
failed
attempts 1
checked 1 week ago
error 500 Server Error: Internal Server Error for url: https://tripwire.topgun.bot/internal/jobs/113784/complete

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable yes yes
high detector ETH value transfer possible yes yes
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high codex Unprotected tap assignment allows attacker to seize liquidation/tax flows no
medium codex Reentrancy window on collateral exit can drain gem before burning SKR no
info cast Heavy EXTCODE*/BALANCE usage no
info cast Heavy CALL-family usage no

Codex

latest run
complete findings
Identified two issues: a critical one-time tap address takeover and a reentrancy vector on collateral exit.
Top findings
  • high Unprotected tap assignment allows attacker to seize liquidation/tax flows
  • medium Reentrancy window on collateral exit can drain gem before burning SKR

Code Metadata

fingerprint
Created block
4752013
Code size
5064
Codehash
0x09f7448da293d2687f41e2562531024d7c20330c11b68461d5fc9c27cebbdb33
Priority score
43734589.127029

Recent Runs

last 20
Run ID Status Validated Total findings Created
f58f1e0d-d765-4f42-8774-1b1e4abc5a43 failed crit 0 high 2 6 3 months ago