TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xc061caa073f3d95f80f8e5428d32d2d76f5e1622 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$3,839,013.25
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
3,839,013.25
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 9 total 9
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high cast SELFDESTRUCT present no
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
high detector SELFDESTRUCT reachable no no
medium detector CREATE/CREATE2 reachable no no
low codex exchange_received lets any caller consume pre-transferred balances no
low cast Contract creation opcode present no
info cast Heavy CALL-family usage no
info cast Heavy EXTCODE*/BALANCE usage no

Codex

latest run
complete findings
Identified 1 issue: `exchange_received` can be front-run to steal pre-transferred tokens because optimistic transfers are not bound to the caller.
Top findings
  • low exchange_received lets any caller consume pre-transferred balances

Code Metadata

fingerprint
Created block
23318664
Code size
23635
Codehash
0x1c7b77a94bb42408ab6d5cfd76223f0c794db9b119bb6035db91d8b09da65512
Priority score
3839013.245044

Recent Runs

last 20
Run ID Status Validated Total findings Created
ffb196f5-96d5-445c-8185-3b020d31e22a complete crit 0 high 0 9 3 months ago