TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xec8902afffb06d0b075ea2d6fb3a45ec8598c39b failed chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 9 total 9
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Workflow
failed
attempts 0
checked 1 week ago
error 500 Server Error: Internal Server Error for url: https://tripwire.topgun.bot/internal/jobs/43003/complete

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Authorization based on tx.origin no
high detector Untrusted DELEGATECALL target reachable no no
high codex Signed actions can be replayed across different GuruFund instances no
medium codex Anyone can front-run and consume another user's signed payload nonce no
medium detector Untrusted CALL target/value reachable no no
medium detector ETH value transfer possible no no
medium cast DELEGATECALL present no
info cast Heavy CALL-family usage no
info cast Heavy EXTCODE*/BALANCE usage no

Codex

latest run
complete source findings
Two exploitable auth issues were found: third parties can consume any valid signature nonce before the intended call executes, and signed payloads are not bound to a specific fund instance, enabling cross-fund replay.
Top findings
  • high Signed actions can be replayed across different GuruFund instances
  • medium Anyone can front-run and consume another user's signed payload nonce

Code Metadata

fingerprint
Created block
Code size
19845
Codehash
0xdbab875662e5705766439e53ba5955202dc47d7798ad788f89e48ce523375acf
Priority score
0.000000
Latest run id

Recent Runs

last 20
Run ID Status Validated Total findings Created
019d5666-7793-71fe-8365-fe0e83fcb95f failed crit 0 high 0 9 1 week ago