TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xccb57afedecc8d975ca4ae06f850a175142499de checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$41,269.00
last balance 3 months ago
ETH
12.9900
WETH
0.0000
USDC
1,000.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 4 total 4
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 3
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
critical detector Untrusted DELEGATECALL target reachable no no
high codex Mint permission can self-issue admin keys and seize full control no
medium cast DELEGATECALL present no
medium slither KeepToken._recoverSig(bytes32,address,uint8,bytes32,bytes32).isValid (contracts/Contract.sol#155) is written in both no
From run 019d5666-7216-7238-b7b1-e53620c8a60e suppressed 1 initializer finding view all

Codex

latest run
complete source findings
Two high-risk access-control issues were identified: uninitialized clone instances can be seized by any caller, and the generic mint role can mint privileged permission IDs and escalate to full control.
Top findings
  • high Mint permission can self-issue admin keys and seize full control

Code Metadata

fingerprint
Created block
16762448
Code size
132
Codehash
0x38ae3b3566baa9c9bf25b441c723bcca258fd6574c1c5fa70a576f8c477314f3
Priority score
41269.000410

Recent Runs

last 20
Run ID Status Validated Total findings Created
019d5666-7216-7238-b7b1-e53620c8a60e complete crit 0 high 0 5 1 week ago
019b477e-cec7-708f-811a-f96a8f46f2e6 complete crit 0 high 0 1 3 months ago
019b3844-a60b-7005-9964-5212cc0e468d complete crit 0 high 0 1 3 months ago