TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xf40f6093d0bc6c174ba3bccf1e3d7d6714a7583e checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$2,790.00
last balance 3 months ago
ETH
0.9000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
2
confirmed findings
crit 0 high 2 unconfirmed 0 total 2
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
high detector Untrusted CALL target/value reachable yes yes
high detector ETH value transfer possible yes yes

Codex

latest run
complete bytecode no findings
BYTECODE_BUNDLE.json indicates a small non-proxy ERC-20-like runtime exposing `name()`, `symbol()`, `decimals()`, `balanceOf(address)`, and `transfer(address,uint256)`. I did not find a meaningful exploitable issue from...

Code Metadata

fingerprint
Created block
639628
Code size
716
Codehash
0x3f42c86ea224fe59f299de5fde71654d4371c019b8bdb311d33f4bce9ca602ee
Priority score
2790.000310

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b3836-265f-72d2-bf66-728911e3a72c complete crit 0 high 2 2 3 months ago