TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xf2cd14f02b4fdc0d26681fbc7f60a11b8378f96d checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 6 total 6
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
1
View top proxies
Workflow
checked
attempts 0
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
medium codex Blacklist can be bypassed via allowance-based redemption/claims no
low codex External asset change limit can be bypassed when values are <1 no
info cast Heavy EXTCODE*/BALANCE usage no
info cast Heavy CALL-family usage no

Codex

latest run
complete findings
Found 2 issues: a blacklist bypass through allowance-based flows and a change-limit bypass in the external asset oracle update logic that can enable large pricing jumps.
Top findings
  • medium Blacklist can be bypassed via allowance-based redemption/claims
  • low External asset change limit can be bypassed when values are <1

Code Metadata

fingerprint
Created block
Code size
22133
Codehash
0xe065055018b6e218ab905146c5fe7ba249ea68fc4ec0db4ae29cbf392d115883
Priority score
0.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
f8c17a8c-6af1-4eab-9c8d-d6d4b5f9b4a8 complete crit 0 high 0 5 3 months ago
cae98014-97ad-4a90-995b-7a0ce222c6b0 complete crit 0 high 0 6 3 months ago