TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xe1237aa7f535b0cc33fd973d66cbf830354d16c7 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$1,537,209.82
last balance 3 months ago
ETH
0.0000
WETH
495.8741
USDC
0.00
USDT
0.00
Findings Signal
2
confirmed findings
crit 0 high 0 unconfirmed 4 total 6
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
medium detector Untrusted CALL target/value reachable yes yes
medium detector ETH value transfer possible yes yes
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Authorization based on tx.origin no
medium codex ERC777-style reentrancy in deposit can mint excess shares no
info cast Heavy EXTCODE*/BALANCE usage no
info cast Heavy CALL-family usage no

Codex

latest run
complete findings
Found 1 issue: reentrancy during deposit can inflate shares and drain the vault when the underlying token supports callbacks (e.g., ERC777).
Top findings
  • medium ERC777-style reentrancy in deposit can mint excess shares

Code Metadata

fingerprint
Created block
10774489
Code size
14637
Codehash
0x29c2ab7f50a0f0c377a199b77ae00f5690033db3dd87ff134bd96b155967ba62
Priority score
1537209.822611

Recent Runs

last 20
Run ID Status Validated Total findings Created
62905bd3-7f23-4198-8cee-9a5bc2390d2a complete crit 0 high 0 6 3 months ago