TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xd01159af63c39ef4de125ac3baa940893e8009cd checked chain 1 proxy
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$43,400.00
last balance 3 months ago
ETH
0.0000
WETH
14.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 5 total 5
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 2 months ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
critical detector Untrusted DELEGATECALL target reachable no no
high codex Unprotected initialize allows hostile takeover of escrow market no
high slither SimpleERC20Escrow.pay(address,uint256) (contracts/Contract.sol#34-38) ignores return value by token.transfer(recipient,amount) (contracts/Contract.sol#37-38) no
medium cast DELEGATECALL present no
low codex ERC20 transfer return value ignored no

Codex

latest run
complete source findings
Found an unprotected initializer that can be seized if the proxy is not initialized immediately, plus an unchecked ERC20 transfer return that can silently fail on non-reverting tokens.
Top findings
  • high Unprotected initialize allows hostile takeover of escrow market
  • low ERC20 transfer return value ignored

Code Metadata

fingerprint
Created block
19491012
Code size
45
Codehash
0x00226a5cb3e7208498c6f5f37819eacce8ee3bc1484883c26c504b6d87511285
Impl codehash
0x3f1b03344f575d1a57970cdc0466fd536bd253467e0a9cb65dfc766c69971fcd
Priority score
43400.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
019c0ea9-094d-71d5-afa7-e616ff0989ab complete crit 0 high 0 5 2 months ago