Proxy Admin Detector
Identify Proxy Contract Admins
Detect and analyze admin capabilities in upgradeable proxy contracts to understand who controls contract upgrades and modifications.
Proxy Admin Identification
Detect hidden proxy admins and upgradeability patterns in smart contracts. Verify who truly controls the contract's logic.
Understanding Proxy Contracts and Admin Rights
Learn about upgradeable proxy patterns and why identifying admin addresses is crucial for security.
What Are Proxy Contracts?
Proxy contracts allow smart contracts to be upgraded without changing their address. They delegate calls to an implementation contract that can be swapped by the admin. This separates data/storage (held in the proxy) from logic (held in the implementation).
Common Proxy Patterns
Transparent Proxy: Uses a separate ProxyAdmin contract to manage upgrades.
UUPS (Universal Upgradeable Proxy Standard): Puts upgrade logic in the implementation itself.
Beacon Proxy: Many proxies point to a single Beacon contract which defines the implementation.
Admin Security Risks
The proxy admin has significant power to upgrade contract logic. Always verify who controls the admin key and whether it's a multisig, timelock, or EOA before interacting with upgradeable contracts.
Timelocks & Multisigs
Timelock: Enforces a mandatory waiting period between proposing an upgrade and executing it.
Multisig: Requires multiple signers to approve upgrades, preventing a single rogue developer from changing the code.
Frequently Asked Questions
It depends. If the implementation logic has 'owner-only' functions (like `mint` or `withdraw`), the admin can abuse them even without upgrading. But upgrading lets them add ANY function they want.
EOA stands for Externally Owned Account. It's a standard wallet address controlled by a private key (like your MetaMask). If an admin is an EOA, a single compromised private key compromises the whole protocol.
Etherscan usually marks them as 'Read as Proxy'. Technically, they often use `delegatecall` in a fallback function and store the implementation address in a standard storage slot (EIP-1967).
Your token balances are stored in the Proxy's storage, so they persist even if the logic (Implementation) changes. However, new logic could delete or steal them.