TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xd60145eab53bfe23ad40c4840cfab89e12cde6f9 skipped chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 2 total 2
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
skipped
attempts 3
checked 1 week ago
skip blacklisted_codehash

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no

Codex

latest run
complete no findings
Reviewed `contracts/contracts/HALLU.sol` in AUDIT_BUNDLE.txt and found no concrete, exploitable profit paths for attackers under the stated assumptions.

Code Metadata

fingerprint
Created block
23852462
Code size
6372
Codehash
0x7c1d177526236628d188ec5271622ca093b2a717e3b5f374ae1064df527808af
Priority score
0.000310

Recent Runs

last 20
Run ID Status Validated Total findings Created
4898f96c-2fcf-4f89-a1d9-d48682829576 failed crit 0 high 0 2 3 months ago
019b477e-de05-72a2-be46-e392111eb8d5 complete crit 0 high 0 2 3 months ago
019b3844-ba9d-70ad-94fc-1ed01c644d08 complete crit 0 high 0 2 3 months ago