ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C67A8DABB069
|
Infrastructure Scan
ADDRESS: 0xdf0151596c8e2eab4cef8006464ac07340aabf36
DEPLOYED: 2026-04-28 09:48:35
LAST_TX: 2026-04-29 20:02:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Pulling contract state from Alchemy RPC… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Analyzing visibility: 3 public, 8 private methods. [MEM] Garbage collector: 0.18ms since last run. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Fuzzing input data for 81 iterations. [TRACE] Stack trace saved to /logs/TRD-9FC62D9A.log. [VALID] Finalizing audit report for 0xdf0151596c8e2eab4cef8006464ac07340aabf36. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x344a0bdf397d53e1c1b08d744109554ae15396eb 0xafa0c24b10ce5bb220a6b6030b2fd23ddc7972ab 0x9df39706b171c190919ebae031a8d7021d6c53f7 0xb385133c41540806ad80aa4baecbb40a66cd3779 0x87f0e973a2562d54c77362a9e8cbdd6631d61128 0xed6b38bb6f080b708e6c39a84d304f47c9a38dc4 0x767a8573a047ee10df87646325d9b631d2a229c7 0xd2b6daa06dd69d757f67226c94378577aff4db66 0x4f0dd5098ffb223264167b131d72319b59ca7f6d 0x22d5be8fa33e087d43092780840395112a692753 0x64f64ed97e240e644a5926afbe95cf9bfda6ec3f 0xb89d696a8454e9b279ee095a6bd8f12fae973238 0x33a4e5882806979c7b8fd895e6698903b48eeab3 0x99ff498c22f3e7c63a3de9a8b23e1999e644eb40 0xd307d32c9d3a51d0a176ea9342af4ab9b0ae43fc 0xaa012a9c1a37331192a77171a02a0dc8d4002c40 0x590fcffc3f53d325f57f74a93f75123c308ffaf1 0x72d9edbc6ef3574a3ddd3c9965688fc659c74a95 0x884fe40a8e9cb319e5a68646804438de2bd6bd4e 0xab29068ad2444222f8115f7ee6769921b28ee158