TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xe617f1722955706bc487257439d9d61fd3a991a4 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$49,600.00
last balance 3 months ago
ETH
16.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 5 total 5
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 3
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
high codex LAST_SUPPLY is reset instead of incremented, enabling repeated withdrawals of the same tranche no
high slither WOREPrivateSale.withdraw() (contracts/Contract.sol#435-456) sends eth to arbitrary user no
high slither Reentrancy in WOREPrivateSale.withdraw() (contracts/Contract.sol#435-456): no

Codex

latest run
complete source findings
Found a withdrawal accounting bug that allows repeated payout of the same tranche, enabling draining of contract funds.
Top findings
  • high LAST_SUPPLY is reset instead of incremented, enabling repeated withdrawals of the same tranche

Code Metadata

fingerprint
Created block
14150158
Code size
3638
Codehash
0xfde528acc861b46571c5885b2daeab1cb0731e53710ae331fe21d08765d64aa7
Priority score
49600.000310

Recent Runs

last 20
Run ID Status Validated Total findings Created
019be3d6-81eb-73d7-8def-05c4bf0dd337 complete crit 0 high 0 5 2 months ago
019b477e-c594-71cf-afc6-4d060190307d complete crit 0 high 0 2 3 months ago
019b3844-a052-720a-afa5-741835263333 complete crit 0 high 0 2 3 months ago