TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xc3e486f614e297d8e016ac2805e81707c627b2d5 failed chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$45,728.04
last balance 3 months ago
ETH
0.0000
WETH
14.7510
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 7 total 7
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
failed
attempts 1
checked 2 months ago
error slither failed (exit 1): 'forge clean' running (wd: /tmp/slither-islxbalv) 'forge config --json' running 'forge build --build-info --skip ./test/** ./script/** --force' running (wd: /tmp/slither-islxbalv) 'forge' returned non-zero exit code 1 Error: Encountered invalid solc version in lib/openzeppelin-contracts/contracts/access/Ownable.sol: No solc version exists that matches the version requirement: ^0.8.20 Traceback (most recent call last): File "/var/www/tripwire/.venv/bin/slither", line 10, in <module> sys.exit(main()) ~~~~^^ File "/var/www/tripwire/.venv/lib/python3.13/site-packages/slither/__main__.py", line 776, in main main_impl(all_detector_classes=detectors, all_printer_classes=printers) ~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/var/www/tripwire/.venv/lib/python3.13/site-packages/slither/__main__.py", line 882, in main_impl ) = process_all(filename, args, detector_classes, printer_classes) ~~~~~~~~~~~^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ File "/var/www/tripwire/.venv/lib/python3.13/site-packages/slither/__main__.py", line 96, in process_all compilations = compile_all(target, **vars(args)) File "/var/www/tripwire/.venv/lib/python3.13/site-packages/crytic_compile/crytic_compile.py", line 722, in compile_all compilations.append(CryticCompile(target, **kwargs)) ~~~~~~~~~~~~~^^^^^^^^^^^^^^^^^^ File "/var/www/tripwire/.venv/lib/python3.13/site-packages/crytic_compile/crytic_compile.py", line 211, in __init__ self._compile(**kwargs) ~~~~~~~~~~~~~^^^^^^^^^^ File "/var/www/tripwire/.venv/lib/python3.13/site-packages/crytic_compile/crytic_compile.py", line 633, in _compile self._platform.compile(self, **kwargs) ~~~~~~~~~~~~~~~~~~~~~~^^^^^^^^^^^^^^^^ File "/var/www/tripwire/.venv/lib/python3.13/site-packages/crytic_compile/platform/foundry.py", line 102, in compile hardhat_like_parsing( ~~~~~~~~~~~~~~~~~~~~^ crytic_compile, str(self._target), build_directory, str(self._project_root) ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ ) ^ File "/var/www/tripwire/.venv/lib/python3.13/site-packages/crytic_compile/platform/hardhat.py", line 52, in hardhat_like_parsing raise InvalidCompilation(txt) crytic_compile.platform.exceptions.InvalidCompilation: Compilation failed. Can you run build command? /tmp/slither-islxbalv/out/build-info is not a directory.

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector ETH value transfer possible no no
high detector Untrusted CALL target/value reachable no no
medium codex Fee swaps rely on spot Uniswap pricing and are sandwichable no
medium codex Bribe points credited from input amount, not actual tokens received no
low codex Unchecked ERC20 return values can cause silent failures and bad accounting no
info cast Heavy CALL-family usage no
info cast Heavy EXTCODE*/BALANCE usage no

Codex

latest run
complete source findings
Found three issues: sandwichable fee swaps based on spot price, bribe points can be inflated versus actual received tokens, and unchecked ERC20 return values can cause silent failures.
Top findings
  • medium Fee swaps rely on spot Uniswap pricing and are sandwichable
  • medium Bribe points credited from input amount, not actual tokens received
  • low Unchecked ERC20 return values can cause silent failures and bad accounting

Code Metadata

fingerprint
Created block
16349796
Code size
8335
Codehash
0x9a7c62a40fd59fcac373554dd8a0fcc041311ed5a4f354826a5db8c32cf54900
Priority score
45728.035121

Recent Runs

last 20
Run ID Status Validated Total findings Created
019c0ea9-072f-73ea-a5f8-5f68e3df6057 failed crit 0 high 0 7 2 months ago