TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xcd0eb8b89c43c3654b4f8d83eb38149327c1107c checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 4 total 4
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Workflow
checked
attempts 0
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
medium detector CREATE/CREATE2 reachable no no
low cast Contract creation opcode present no
From run f517204f-a968-4a9f-8960-e187c975c3b2 suppressed 1 initializer finding view all

Codex

latest run
complete findings
Public initializer can set owner/secondary when uninitialized, enabling ETH/ERC20 withdrawals by an attacker.

Code Metadata

fingerprint
Created block
Code size
2928
Codehash
0x425f21330af49f9b0f872b8a8bf9e9fb5830234011ef7014c6e5cfcea188d07e
Priority score
0.000000
Latest run id

Recent Runs

last 20
Run ID Status Validated Total findings Created
f517204f-a968-4a9f-8960-e187c975c3b2 complete crit 0 high 0 5 3 months ago
28314401-a631-4fac-9ab0-c012357c5aa1 complete crit 0 high 0 4 3 months ago