TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xf211128cc6d925a3a328647cf78b322b51429c53 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$58,771.78
last balance 3 months ago
ETH
18.9586
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 5 total 5
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 3
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
critical codex Unprotected network initialization lets attacker set critical contract dependencies no
medium codex External call before state updates enables reentrancy/price manipulation no
medium detector Untrusted CALL target/value reachable no no
medium detector ETH value transfer possible no no
info cast Heavy EXTCODE*/BALANCE usage no

Codex

latest run
complete source findings
Critical access-control flaw in network setup allows anyone to seize external contract roles; external calls before state updates allow reentrancy-based price/accounting manipulation if those roles are malicious.
Top findings
  • critical Unprotected network initialization lets attacker set critical contract dependencies
  • medium External call before state updates enables reentrancy/price manipulation

Code Metadata

fingerprint
Created block
7411696
Code size
19074
Codehash
0x4ac06b26359eed94dda83ea1a653cadb741a30f3d3db830f606c23518a73680b
Priority score
58771.780381

Recent Runs

last 20
Run ID Status Validated Total findings Created
019bab3b-ab50-73ed-9109-2fa3a622bb57 complete crit 0 high 0 5 3 months ago
019b477e-b4c0-72b6-b561-0fe5853c3af1 complete crit 0 high 0 2 3 months ago
019b3844-9213-70d6-8f11-2c51c45b2442 complete crit 0 high 0 2 3 months ago