TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xe2ff0a931f92198233c36501780d08d55dd9432f checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$2,714,050.00
last balance 3 months ago
ETH
0.0000
WETH
875.5000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 4 total 4
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
medium codex External token CALL before state updates (reentrancy window) no
low codex ERC20 transfer return value decoded but not enforced no

Codex

latest run
complete findings
Found two bytecode-level issues: external token transfer calls are followed by state updates (reentrancy window) and the ERC20 transfer return value is decoded but not checked.
Top findings
  • medium External token CALL before state updates (reentrancy window)
  • low ERC20 transfer return value decoded but not enforced

Code Metadata

fingerprint
Created block
18988191
Code size
9739
Codehash
0x4c31e7d81cc90e0569a103e067c9648f8aae7e2a10d7834fc766d13c2d00a29e
Priority score
2714050.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
dc39f4dd-c3c3-4e8f-b144-c30baee7c884 complete crit 0 high 0 4 3 months ago