TW
Tripwire
Find contracts. Test them. Review real vulns.
Dashboard
Vulns
All Findings
Runs
Contract
0xc362bb39ec242aaf35446d00a18df52321cbdd7d
checked
chain 1
proxy
Latest run:
6891a337-58f0-4cf2-8c90-4fd3a7d2e4c5
complete
Dedaub
Queue
Audit
Audit + LLM
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$181,247.03
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
181,247.03
USDT
0.00
Findings Signal
0
confirmed findings
Re-run validation
crit 0
high 0
unconfirmed 3
total 3
Latest run
6891a337-58f0-4cf2-8c90-4fd3a7d2e4c5
complete
validated = confirmed for call sinks; sink observed for others
Proxy & Workflow
linkage
Proxy status
proxy
Implementation address
0xb95193fba71b82b245cb3456d1dd2c15ee779e01
(tracked)
Proxies pointing here
0
Workflow
checked
attempts 2
checked 3 months ago
Latest Findings
validated = confirmed for call sinks; sink observed for others
Re-run validation
No confirmed findings yet.
Show unconfirmed findings
Severity
Tool
Title
Validated
Confirmed
high
detector
Untrusted CALL target/value reachable
no
no
high
detector
ETH value transfer possible
no
no
info
cast
Heavy EXTCODE*/BALANCE usage
no
—
From run
6891a337-58f0-4cf2-8c90-4fd3a7d2e4c5
Codex
latest run
complete
no findings
Reviewed BYTECODE_BUNDLE.txt end-to-end; from bytecode alone I could not identify a concrete, exploitable path to extract ETH/tokens/NFTs.
View run
Code Metadata
fingerprint
Created block
11007025
Code size
1137
Codehash
0xdae1e03b4c632149c620fa0dcec1708861941d9376ad4d66f6e06ba5e858cddc
Impl codehash
0x7b1c473eda9774846bce65d4a565e96c9358fdb782b44979234fbbf9dd5dd5a0
Priority score
181247.030001
Latest run id
6891a337-58f0-4cf2-8c90-4fd3a7d2e4c5
Recent Runs
last 20
Run ID
Status
Validated
Total findings
Created
No runs yet.