TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xf6402a6c28a06669a3274c42f2c97a01f2c77366 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$310.00
last balance 3 months ago
ETH
0.1000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
2
confirmed findings
crit 0 high 2 unconfirmed 0 total 2
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
0
Workflow
checked
attempts 1
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
Severity Tool Title Validated Confirmed
high detector ETH value transfer possible yes yes
high detector Untrusted CALL target/value reachable yes yes

Codex

latest run
complete bytecode no findings
Read BYTECODE_BUNDLE.json and reviewed the runtime bytecode, detector output, storage accesses, and callsites. This appears to be a small token-like contract with best-effort selector matches for `name()`, `decimals()`,...

Code Metadata

fingerprint
Created block
1710172
Code size
710
Codehash
0x289530693f3ee5d3a88c2632409fec9d12f8860d6e925b201f1169c0cdeda88e
Priority score
310.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
019b3836-4a73-709e-aeb4-192941b16d0f complete crit 0 high 2 2 3 months ago