TW
Tripwire
Find contracts. Test them. Review real vulns.
Contract
0xfe6eb3b609a7c8352a241f7f3a21cea4e9209b8f skipped chain 1 proxy
Dedaub
Queue = batch runner. Audit = immediate run. Audit + LLM forces codex.
Value & Balances
$4,956,566.14
last balance 3 months ago
ETH
0.0000
WETH
1,598.8923
USDC
0.00
USDT
0.00
Findings Signal
0
confirmed findings
crit 0 high 0 unconfirmed 11 total 11
validated = confirmed for call sinks; sink observed for others

Proxy & Workflow

linkage
Proxy status
proxy
Implementation address
Proxies pointing here
0
Workflow
skipped
attempts 1
checked 3 months ago
skip blacklisted_codehash

Latest Findings

validated = confirmed for call sinks; sink observed for others
No confirmed findings yet.
Show unconfirmed findings
Severity Tool Title Validated Confirmed
high detector Untrusted DELEGATECALL target reachable no no
high detector Authorization based on tx.origin no
medium detector CREATE/CREATE2 reachable no no
medium cast DELEGATECALL present no
medium detector ETH value transfer possible no no
medium detector Untrusted CALL target/value reachable no no
low codex Reentrancy during `_mint` can bypass `depositCap` no
low cast Contract creation opcode present no
info cast Heavy CALL-family usage no
info cast Heavy EXTCODE*/BALANCE usage no
info codex Shares minted without verifying actual assets received no

Codex

latest run
complete findings
Reviewed `contracts/src/SparkVault.sol` and found two low-risk issues: a reentrancy-enabled deposit cap bypass and an accounting assumption around fee-on-transfer assets.
Top findings
  • low Reentrancy during `_mint` can bypass `depositCap`
  • info Shares minted without verifying actual assets received

Code Metadata

fingerprint
Created block
23484474
Code size
163
Codehash
0x9dc4caa1d9a88e199d6e4ceaf889a4f6c229cb265c96a3e9473d999b352afff8
Impl codehash
0xb17c6ee23694ab3a316535b4e941da0c31df81d350bf721009ed864b38ae9baa
Priority score
4956566.135028

Recent Runs

last 20
Run ID Status Validated Total findings Created
No runs yet.