ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-BF947C42B76C
|
Infrastructure Scan
ADDRESS: 0xa1aa29447e7782d5e6e5314a214d0bb3e79851e3
DEPLOYED: 2026-05-10 17:28:47
LAST_TX: 2026-05-10 21:00:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Pulling contract state from Alchemy RPC… [FETCH] Received 57 segments of contract data. [SCAN] Mapping internal logic flow and branching. [MEM] Tracking pointer 0x8c9664a3 in memory heap. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Mocking MSG.SENDER as 0x57a42107c96a38c24bed42bd8e1847ea41a8461c. [TRACE] Stack trace saved to /logs/TRD-3A4D853D.log. [VALID] No critical memory leaks during simulation. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2eafb81d3126d8c9af9e70e9b80cee3277dc3e5f 0xc7bc2415f49cd460a9270bf87d926f378d955b72 0xca75616f68f3166d95e65640fee5377614643169 0x8ec23f017ee3f4523bb034340c8d5c62913d7d1a 0xceecf780c37a1287e1e4c447e348ebc3da1f4630 0xafdb3ea6a805bf5f49454b44021e4e8696a36852 0xb80194900ce8190a28174e424fa9e9e7e1983988 0x45b9dbe3d64fccdb506aaa817fee5d48ad7f7b1a 0x50349fc25dd6329a9297d123e708980936728f27 0xfd5e024792795b197e717c25e45eb4d8285e614f 0xa816df9fee674a48d6b74448681d2b573df50587 0x012e1363787f993973d06cdfe6c1ce5fc8c66fa2 0x99ac33e1d34b079be6c075e1c819bfdd4db4a1bb 0x8bdbc997e5d6df29bf3245d4ccf3b9746370f6c0 0x2908232af459330a941614673fb686ebcc31ed38 0x9c8cd4697d93583491b8a59eaedbbb8d72497ffe 0xd85cc4d00d740b5813c2f5ec67619bc08331a0e1 0x490b1e59870bb0c17ea7c994a65afc955e6bfb49 0x2d8703f371c4ae3b0d06cdd38e51e8f264394623 0x0b5306e4d8d95aafd71a6609fb766f47c706b12a

