TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xf317a365cfef0aa4357abd057048808a1d430402 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$58,424.26
last balance 3 months ago
ETH
18.8465
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 6 total 6
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 3
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high slither Plague.feeWithdraw() (contracts/Contract.sol#553-571) sends eth to arbitrary user no
high detector Untrusted CALL target/value reachable no no
high detector ETH value transfer possible no no
low codex `onlyHuman` contract check is bypassable via constructor calls no
low codex Game timing and price logic depend on block.timestamp manipulation no
info cast Heavy EXTCODE*/BALANCE usage no

Codex

latest run
complete source findings
Found two low-severity issues: the anti-contract access control can be bypassed, and round timing/pricing relies on manipulable block timestamps.
Top findings
  • low `onlyHuman` contract check is bypassable via constructor calls
  • low Game timing and price logic depend on block.timestamp manipulation

Code Metadata

fingerprint
Created block
6232830
Code size
10321
Codehash
0x932bd7a2afb6f9bb7f99a04370d00c904351088b82dd83a05d4581188a59dc49
Priority score
58424.259619

Recent Runs

last 20
Run ID Status Validated Total findings Created
019bab3b-ab84-72af-bef3-c28e12418fef complete crit 0 high 0 6 3 months ago
019b477e-b19e-71cb-bb25-3c5f6a0740f4 complete crit 0 high 0 2 3 months ago
019b3844-8ffe-71e7-a036-8890cd866e26 complete crit 0 high 0 2 3 months ago