TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xe8078b5198e572be8d8d412511d48b7d0f5e9a1c checked chain 1 proxy
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$860,177.95
last balance 3 months ago
ETH
277.4768
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 6 total 6
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 3
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high codex Unprotected Chainlink feed initialization enables malicious oracle and governance takeover to drain ETH no
high detector Untrusted DELEGATECALL target reachable no no
medium cast DELEGATECALL present no
medium detector Untrusted CALL target/value reachable no no
medium detector ETH value transfer possible no no
info cast Heavy EXTCODE*/BALANCE usage no

Codex

latest run
complete findings
Unrestricted oracle initialization lets an attacker set a malicious price feed, mint disproportionate tokens, seize maintainer role, and drain the contract’s ETH via governance distribution.
Top findings
  • high Unprotected Chainlink feed initialization enables malicious oracle and governance takeover to drain ETH

Code Metadata

fingerprint
Created block
13861504
Code size
991
Codehash
0x49fb5d1895fb097f8d54a159e301ca36d855afb074e0e6ad594f4be66e04562c
Impl codehash
0xd5581edc4706ede6b13fdb1f6f86c508aab59ebc582c1790f1626a9fcdd645f7
Priority score
860177.945606

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b477e-c459-7397-a773-abe5f86ca442 complete crit 0 high 0 1 3 months ago
019b3844-9f66-72b9-8bcb-711a0707b5e3 complete crit 0 high 0 1 3 months ago