TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xfc59ab348e0c0e789e914b0864f08cab98db1553 checked chain 1
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$0.00
last balance 3 months ago
ETH
0.0000
WETH
0.0000
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 5 total 5
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
non-proxy
Implementation address
Proxies pointing here
1
View top proxies
Workflow
checked
attempts 0
checked 1 week ago

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
medium codex Reentrancy guard can be reset mid-call via public initializePoolV2 no
medium detector Untrusted CALL target/value reachable no no
medium detector ETH value transfer possible no no
low codex Unprotected initializePoolV2 can be front‑run to block upgrade initialization no
low codex Owner can drain staked/reward tokens via saveMe no

Codex

latest run
complete findings
Identified 3 issues: a public initializer can reset the reentrancy guard mid-call, the same initializer can be front‑run to block intended upgrade initialization, and the contract owner can drain pool funds via the rescu...
Top findings
  • medium Reentrancy guard can be reset mid-call via public initializePoolV2
  • low Unprotected initializePoolV2 can be front‑run to block upgrade initialization
  • low Owner can drain staked/reward tokens via saveMe

Code Metadata

fingerprint
Created block
Code size
16574
Codehash
0x8a62af911991e3727e424424444651301503a9e08f01eba499de7b8f9935b5fd
Priority score
0.000000

Recent Runs

last 20
Run ID Status Validated Total findings Created
ff932ff9-2ce9-490b-9514-dd6f80ed85c1 complete crit 0 high 0 4 3 months ago
a5d04c17-5a96-4bbb-8db1-668693dc67db complete crit 0 high 0 5 3 months ago