TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xe9778e69a961e64d3cdbb34cf6778281d34667c2 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$902,684.34
last balance 3 months ago
ETH
291.1885
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 4 total 4
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 3
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
critical codex Public verifyState delegates to attacker-controlled target during upgrades, enabling arbitrary code execution and token drain no
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
info cast Heavy EXTCODE*/BALANCE usage no

Codex

latest run
complete findings
Found an upgrade-window delegatecall gadget that allows arbitrary code execution and token drain during upgrades.
Top findings
  • critical Public verifyState delegates to attacker-controlled target during upgrades, enabling arbitrary code execution and token drain

Code Metadata

fingerprint
Created block
10763629
Code size
10634
Codehash
0x238bf01401757df2368e9c77ececb0199dff92bd8f110f511b593c263f9c6bb5
Priority score
902684.342769

Recent Runs

last 20
Run ID Status Validated Total findings Created
9669f033-142c-498f-a5e9-51ea916b6a54 complete crit 0 high 0 4 3 months ago
019b477e-b987-7164-9180-e37618d7237f complete crit 0 high 0 2 3 months ago
019b3844-9683-7007-9af3-3138d429962d complete crit 0 high 0 2 3 months ago