TW
Tripwire
Find contracts. Test them. Review real vulns.
Dashboard
Vulns
All Findings
Runs
Contract
0xf553e6d903aa43420ed7e3bc2313be9286a8f987
checked
chain 1
proxy
Latest run:
ea503cad-40e9-45b2-b499-15207ca468f7
complete
Dedaub
Queue
Audit
Audit + LLM
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$2,991,996.10
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
2,991,996.10
USDT
0.00
Findings Signal
0
confirmed findings
Re-run validation
crit 0
high 0
unconfirmed 2
total 2
Latest run
ea503cad-40e9-45b2-b499-15207ca468f7
complete
validated = confirmed for call sinks; sink observed for others
Proxy & Workflow
linkage
Proxy status
proxy
Implementation address
0x2ccd5486ea1b2a52dcd387c01314f6a328f66cbb
(tracked)
Proxies pointing here
0
Workflow
checked
attempts 2
checked 3 months ago
Latest Findings
validated = confirmed for call sinks; sink observed for others
Re-run validation
No confirmed findings yet.
Show unconfirmed findings
Severity
Tool
Title
Validated
Confirmed
high
detector
ETH value transfer possible
no
no
high
detector
Untrusted CALL target/value reachable
no
no
From run
ea503cad-40e9-45b2-b499-15207ca468f7
suppressed 1 initializer finding
view all
Codex
latest run
complete
findings
Found one concrete exploit path that allows ownership takeover via an unprotected reinitializer, enabling a full bridge drain after swapping the L2 bridge address.
View run
Code Metadata
fingerprint
Created block
21395362
Code size
2143
Codehash
0x43463a8c09849dc905f076415798ec0673bea402cfd644b23b04da21bda7b726
Impl codehash
0x991999384e12ef11591b9217db4d4513f8563cc5bf8f33494cfce29dcfbce665
Priority score
2991996.100601
Latest run id
ea503cad-40e9-45b2-b499-15207ca468f7
Recent Runs
last 20
Run ID
Status
Validated
Total findings
Created
No runs yet.