TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xfb3102759f2d57f547b9c519db49ce1ffde15db2 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 5 total 5
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
1
View top proxies
Workflow
checked
attempts 0
checked 3 months ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Untrusted DELEGATECALL target reachable no no
medium cast DELEGATECALL present no
medium detector Untrusted CALL target/value reachable no no
medium detector ETH value transfer possible no no
medium codex Dex vault rebalance can skip native allowance decrement based on protocol-supplied return values no

Codex

latest run
complete source findings
Found one medium issue where native-token allowance accounting for dex vault rebalances can be bypassed by a malicious protocol returning misleading values, enabling spending beyond configured limits.
Top findings
  • medium Dex vault rebalance can skip native allowance decrement based on protocol-supplied return values

Code Metadata

fingerprint
Created block
Code size
16865
Codehash
0xdf100117ce10e0727df33ee6631898b081fc3c1936e821b9107a76fdc6b29370
Priority score
0.000000
Latest run id

Recent Runs

last 20
Run ID Status Validated Total findings Created
019ba9bd-3bd2-7165-b27e-350fe4b4d11c complete crit 0 high 0 5 3 months ago