ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4E1C203B19CF
|
Infrastructure Scan
ADDRESS: 0x963c82d6ad83456aa3076dac4eae9bc3d2d971ca
DEPLOYED: 2026-05-16 21:03:35
LAST_TX: 2026-05-16 21:46:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: E82351C2. [NET] Pulling contract state from Alchemy RPC… [FETCH] Received 17 segments of contract data. [SCAN] Running static analysis on JUMP instructions… [MEM] Allocating stack frame for EVM simulation… [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Mocking MSG.SENDER as 0xe1209a5594a9fa538582d94391d04058f1705ff8. [TRACE] Bytecode segment 0x70 analysed. [VALID] Finalizing audit report for 0x963c82d6ad83456aa3076dac4eae9bc3d2d971ca. [DONE] Report exported to IPFS: 514f3d77…4bcbe1b5.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3b8093f87fd3c878b5f1bcd71812c97e5b75858b 0xd4deb8545746c7cab15de11f9816685360811fe7 0xafd96fef9ebc5cbacb53e65942b3d7223547f50b 0x22c22941a75cd0f00f2c2a8d98a54f9e3c83c677 0x2fc5ec9205de5ca96be70f4556c2c1b3cf2f87b0 0x0e4fa3ac5c27d197c077f7baf041420a6de57c49 0x9f4255cc39f8e96711408aac6fad5e1d14348aa0 0xa01545d10f8450265b6ceb8133be60bb75473b56 0x0aec912103a2846c5d14d47c091fedbdabb63fa1 0x5d9e533e579a521251f2c37bdb6902d486826584 0xb7657e703bd7898e72fd0413aaef3f28f00c0564 0x1a2fa8c14de01cf9c804b9948de6d4663f119d7d 0x347b5d24eb4c9cff29bf26c049973c0b595eb367 0x51df93a2940368e0d0be6e2edf293dd94fe5740d 0xd38ab0d10f907cd572803a41e039c08570366559 0xd9cdec40ac159d754564db0dbd66f5cf697f133e 0x9e585134808b728f580832294b85c7e3d82b8f29 0x02d628a805dc3b145146896cec5cbed414b48aff 0x6314155add9897b1985c3ed156bfd5fa55b4f7fa 0x566e300f7cc46a0dee073a967cd5b13d39602b85
