ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E5A59238E2B4
|
Infrastructure Scan
ADDRESS: 0xd0d7155fbc0be3cf3068b921f5e9e9d5b9480648
DEPLOYED: 2026-04-21 12:07:11
LAST_TX: 2026-04-24 12:59:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Pulling contract state from Alchemy RPC… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping ownership-protected functions… [MEM] Allocating stack frame for EVM simulation… [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Comparing result with Triada-Security-Standard. [DONE] Report exported to IPFS: 85cf444c…7c073ffb.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7583f507195758ff701f80dded845594db4a99d9 0xb45e929a79c438c14aecfff2b89b5553a8938642 0x62c8a3e353593cff93e7099915bcd92edb5ab07c 0x3deb3653dd38ed5053b0849ea5e2345d18d1219d 0x89f9a6b4ba8b3298a22c511c79b69469153f302e 0x627585a1b5d944970e588d12670c2153eab07c49 0x7832eb6c3032970bffdeea0dbde6a98842d9d27d 0xa70c94d78f3fadc3fc21a589779b9b41e4f4dc65 0x5bbddd836f5e618d0324fe2c82454394009b4afa 0x8b6f3b1d750fc4a4f42acda4521ee377feba25e2 0x807339b9a8d04c83446e626d65b1977648960c3d 0x5e3fcf3fdd1ad97916fe152aa8bd7a5ad0ea97a2 0x89d4e546d63ae114cb95947a033e5a51d247c729 0xe481e067d5b9eb09988e87e34fb2c68cad5072e7 0x6f4bd64f1a35f450ece27feafae8558c731ae6dd 0xb94e323a59dfc8a2810241f381d8a623cde59ded 0xee8aed4e32ac579c2286404c7f526083e742d28c 0x22f05515497ce8d78f3898088c474403ac9c668f 0x3b2f82cb28e47b0fe33ab6cfe686364792126c38 0x9013289eff46021b8fd039a070a2cc0a5bd553d5
