ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0BB17CB4DCEA
|
Infrastructure Scan
ADDRESS: 0x615771e3510a5898b38ab46da2f5b4ef67a2f077
DEPLOYED: 2026-05-10 18:17:59
LAST_TX: 2026-05-11 15:26:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Garbage collector: 0.73ms since last run. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: a709 -> fca1 -> 7640. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Scan task 559EF949 finished in 24s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7b98942ad6e341ffcc5079d4b29ef2cbd5a69624 0x980e56aa2c7a2c3818ff197ae8b3beba2cb3a83b 0x981bccf195cc6611286cf288542f80c45ac5e479 0xc046c8af1170f466fd295ced0d7044dca5a617ed 0x0225f2553922637dd8073bf51cb4d630206737e4 0x595550983df771a5b85f41e13ced50fbd349d2af 0xf29feac969c7948d7516c6bcdc1683db606337e5 0xff82282cca80cb1d27a0d2d6e6bb9f331f6896e1 0x0cb6cce70f73b7795d719ce7ae3e41d459ed622b 0x6b184a26111ab81d90384ed53c652c81db931b18 0x981df20bbc101599f8f7038ccb654b7b74c1a6fd 0xb271c85d1910f8caf25bd5e2e4ba5339f102c72b 0xb2f750eef1f0eebc87d303ec1aa8d4837240f634 0xaf87138bf9fbf4e4a45c1a3a2aa5aaba8f985263 0xf04efa9324f68441989bc414af1f441e5a48f42d 0x2af5013effbc9545e4574591b9926c79ae49246b 0xeaad376694da4a67978182a0acf385d4fc5cee2e 0x1e26fbd1534cc6f49e5b1678f9a002e671eb3bd1 0xe9b0b2cc0813c9cdffd7891a6690ac429ad35f04 0xd39517d38510610a248ed925e0e84d59b24c91c6
