ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-AA336394CBCF
|
Infrastructure Scan
ADDRESS: 0xa18d42065203d6c2f2c8be029a3a1463185ee44a
DEPLOYED: 2026-05-02 22:58:35
LAST_TX: 2026-05-06 04:50:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Entry point found at offset 0x4a14. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Garbage collector: 0.55ms since last run. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Mocking MSG.SENDER as 0x5f3ff89f10738604f399e7d834d738da0d1c655e. [TRACE] Program Counter (PC) synchronized at 2515. [VALID] Finalizing audit report for 0xa18d42065203d6c2f2c8be029a3a1463185ee44a. [DONE] Scan task F0C3CCAF finished in 75s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x157a551842e5332fdee8b7da3623b831320187bd 0x6dc75014e683a1b0fe76d925181517a3c26719bf 0x3b9556eb19ec7d91fcc3477dcae3cef94c3dc840 0x204e864dc98cb27e443e15be7900ccfe79c95472 0x7a33e84f4af6338a032df2cf7d7256d2c52825f3 0x90c6302543a94a2c4a389f2a6c03f9cd9f798064 0xb9783d9bd7022b1fca458518dc0e10646720acf0 0x3eac5d5322c72222b64227fac7173f34184d9be8 0x4a0cdd0ed6d9c486bec0abbe169b6a13a5b4986d 0x31172b1d93ed2c6281598bb661a7c1ea5053f667 0xaac64ed07837f535f6e498c72936b83bc82dc5a5 0x302806e9b5cd1d10f97edd493dff06e6266d798f 0xf023a91c526857b7ec81c7a52dccc00b95fedef0 0xde8cc7db954426d2f2add05933ec83b2f400cf0e 0x41a08001694c4f87468496b652dc0de1a6ab172e 0xfbbfdfa9f311e751e976b6243381ddc4016c4253 0x09b9349232cedb36a9e0efaea06b5fda7c49a82a 0x39666aa7a99278d5e5cb43c9b8d41b8acd6ebe7a 0xafe70a5acd9ed37cf5eb3c92a474eee70cbcde80 0x5e428c29dc463f58d97a4ea29629a353069973c5
