TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xc186e6f0163e21be057e95aa135edd52508d14d3 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 4 total 4
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
1
View top proxies
Workflow
checked
attempts 0
checked 3 months ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
medium codex Computed external CALLs (some with ETH value) can be dangerous if target is attacker-controlled no
info cast Heavy EXTCODE*/BALANCE usage no

Codex

latest run
complete bytecode findings
Bytecode shows multiple low-level CALLs with computed targets/values and no detected guard patterns; no delegatecall/proxy patterns are present in this runtime artifact.
Top findings
  • medium Computed external CALLs (some with ETH value) can be dangerous if target is attacker-controlled

Code Metadata

fingerprint
Created block
Code size
8721
Codehash
0xbd362f836bca3bcbddd40f9d0e753cfbe34f806e28dc930708812aa9ec01f304
Priority score
0.000000
Latest run id

Recent Runs

last 20
Run ID Status Validated Total findings Created
019bb491-abe0-7015-aafa-7b767eaf03d1 complete crit 0 high 0 4 3 months ago