ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-21E7EFD20F9D
|
Infrastructure Scan
ADDRESS: 0xd7a43751b6160c6d1cbe3415ecb99d6579468660
DEPLOYED: 2026-05-01 12:40:59
LAST_TX: 2026-05-01 14:14:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 13237B82. [NET] Handshake with node 0x14fab860 successful. [FETCH] Entry point found at offset 0x2f84. [SCAN] Mapping internal logic flow and branching. [MEM] Gas profile: Opcode ‚SSTORE‘ cost analysis started. [VULN] Detecting ‚Front-running‘ risks in mempool. [SIM] Mocking MSG.SENDER as 0x147a8bf04a3482f87d8c387287cbed54217dc271. [TRACE] Internal log: ‚OwnershipTransferred‘ event emitted. [VALID] No critical memory leaks during simulation. [DONE] Report exported to IPFS: ecbee220…9c0f03ac.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd312e0f5dfa3fa9fc6dcd65ea300bdb858962238 0x2b3a0195fd23ce7d19c6cd0abd22b161296289ee 0x359ef79d6305cbec9cdbb6cc8d1561639220c161 0x10f55d25b713c7bd708c067b1514f92b70c9b5dd 0x72f749f2f2ad7cd6a437b6e86ce382a699f3983f 0x8b9bfafeea503a2e103f9160e0b24d555dd443a5 0x193e0e6ff1d00cd5413bd54a42ed10956f3f9c3d 0x1125eed321a48ad48c4a8fbd8a6bad538bb85780 0x7425b4ddbe70d2c94ed2c4470cb7b6da3000c681 0xc4a0bd7a2f397e9053005d51ed39045d50c6d4c6 0x6e7b74b8d5ed46d3dfd39431483e2017e3e045aa 0xeb7c55ad1933d2d67a4098ba82827af3a0860d6e 0x44359b961153b30bfb686f48cdb9615afe514410 0x7275c6eea53ee87b239ed70c400f84df65e00ce7 0x400ce1f28572d3ccbbbfab38aecc51759953277f 0x87199fec37de700ce605de629ff30b536138dc60 0xf8e84faa02438c141c82f827cc606225f07462e5 0x3f93aea9a893f86af666430e97314cdc2841b5e5 0x289fe649eee3cda6bacf0f90c11a6ce610b65f50 0xbc2bc4745c840695d43e917a5e0770ea438572fd