TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xc07ec6b6e3783b6855d000e104e44b3f86bbfc22 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$62.00
last balance 3 months ago
ETH
0.0200
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
2
confirmed findings
crit 0 high 2 unconfirmed 2 total 4
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable yes yes
high detector ETH value transfer possible yes yes
Show unconfirmed findings
Severity Tool Title Validated Confirmed
critical codex Unprotected ownership assignment lets any caller seize privileged control no
high codex Unchecked low-level ETH payouts can silently fail while accounting still advances no

Codex

latest run
complete bytecode findings
Bytecode-only review found a critical ownership-takeover path and a separate high-severity unchecked-call/accounting issue. Selector inference is best-effort, but the slot5 owner pattern and post-CALL state transitions a...
Top findings
  • critical Unprotected ownership assignment lets any caller seize privileged control
  • high Unchecked low-level ETH payouts can silently fail while accounting still advances

Code Metadata

fingerprint
Created block
1277529
Code size
2523
Codehash
0x5d300a40efbe8176b85ea632a0d3da8988e0256d9c3a36e87e40cc8884a9862f
Priority score
62.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b3836-39ba-7004-a435-a288b804611b complete crit 0 high 2 4 3 months ago