TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xbf4aa23fc8a11f84f6ce07a11b1f7455b732eb1b checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
2
confirmed findings
crit 0 high 2 unconfirmed 2 total 4
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable yes yes
high detector ETH value transfer possible yes yes
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high codex Withdrawal paths send ETH to CALLER before clearing caller-specific accounting no
low codex Fallback and unknown-selector paths appear to accept ETH without crediting any user state no

Codex

latest run
complete bytecode findings
Bytecode review found one high-confidence reentrancy issue in the two ETH-withdrawal paths and one low-confidence but well-evidenced accounting hazard where the fallback/unknown-selector path silently accepts ETH without...
Top findings
  • high Withdrawal paths send ETH to CALLER before clearing caller-specific accounting
  • low Fallback and unknown-selector paths appear to accept ETH without crediting any user state

Code Metadata

fingerprint
Created block
219546
Code size
2424
Codehash
0x35d59489055c78650ea665da1843b94aa765a1b2ec6bf32b6e9373648ebef21d
Priority score
0.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b3831-b510-72f0-943d-9bb9b2a2899a complete crit 0 high 2 4 3 months ago