TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xc0026e559da7f2d4ee573616c09a8f721fa599bd skipped chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 7 total 7
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
1
View top proxies
Workflow
skipped
attempts 0
checked 1 week ago
skip blacklisted_codehash

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
medium codex Blacklist bypass: blacklisted spender can still transfer via transferFrom no
medium detector CREATE/CREATE2 reachable no no
low cast Contract creation opcode present no
info cast Heavy EXTCODE*/BALANCE usage no
info cast Heavy CALL-family usage no
From run 08e6a475-e8b8-4f68-8143-0dc96c883782 suppressed 1 initializer finding view all

Codex

latest run
complete findings
Identified two access-control issues: a publicly callable upgrade initializer that can be abused after a v1→v2 upgrade, and a blacklist bypass in transferFrom allowing blacklisted spenders to move funds with existing all...
Top findings
  • medium Blacklist bypass: blacklisted spender can still transfer via transferFrom

Code Metadata

fingerprint
Created block
Code size
24479
Codehash
0x42bf81b030febc01584ef48fca7018ccbeefbcebbf180b781c867684a56b70f0
Priority score
0.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
46be74a4-c571-4c25-80f5-b3aaea655906 failed crit 0 high 0 6 3 months ago
08e6a475-e8b8-4f68-8143-0dc96c883782 failed crit 0 high 0 8 3 months ago