TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xc861fc8dc9537159d94acbd662439046ea407166 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$49.60
last balance 3 months ago
ETH
0.0160
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
2
confirmed findings
crit 0 high 2 unconfirmed 2 total 4
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable yes yes
high detector ETH value transfer possible yes yes
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high codex Unguarded arbitrary CALL gadget can write attacker-chosen data into storage no
medium codex State update happens after an attacker-controlled external CALL with no visible reentrancy guard no

Codex

latest run
complete bytecode findings
Bytecode-only review found no proxy/delegatecall/selfdestruct behavior, and most CALL sites appear to be identity-precompile (0x04) buffer copies rather than value-moving interactions. The meaningful risk is selector 0x4...
Top findings
  • high Unguarded arbitrary CALL gadget can write attacker-chosen data into storage
  • medium State update happens after an attacker-controlled external CALL with no visible reentrancy guard

Code Metadata

fingerprint
Created block
370458
Code size
610
Codehash
0x6efe08518e72074bd72e0c01a48edca98ab60ee9935fa8b833e4945b882c2cf7
Priority score
49.600000

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b3836-22f2-7323-a0f4-cbc79d8a01c5 complete crit 0 high 2 4 3 months ago