TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xe2b8eb988735f7709d08b7d07b41460073904830 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 7 total 7
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Untrusted DELEGATECALL target reachable no no
high detector Authorization based on tx.origin no
high codex Privileged arbitrary delegatecall (owner backdoor) no
medium detector Untrusted CALL target/value reachable no no
medium cast DELEGATECALL present no
medium detector ETH value transfer possible no no
info cast Heavy CALL-family usage no

Codex

latest run
complete findings
Found 1 issue: an owner-gated path allows arbitrary delegatecall to calldata-supplied targets, enabling full contract context execution by the privileged address.
Top findings
  • high Privileged arbitrary delegatecall (owner backdoor)

Code Metadata

fingerprint
Created block
15092461
Code size
4026
Codehash
0x4c333cb905fe771d564ec934124c3720073b485883c61e2bb5e63008415b874b
Priority score
0.000413

Recent Runs

last 20
Run ID Status Validated Total findings Created
4e22cd5b-4962-4023-b255-f35d5e861e60 complete crit 0 high 0 7 3 months ago