ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-14AF5275976A
|
Infrastructure Scan
ADDRESS: 0x9e1ac54d2005cef659d66d916971acf91944e92a
DEPLOYED: 2026-04-28 15:02:47
LAST_TX: 2026-04-29 06:16:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Connection established. Peer count: 56. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0x956b894d in memory heap. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Balance check: 7.17 ETH. [TRACE] Bytecode segment 0xe6 analysed. [VALID] No critical memory leaks during simulation. [DONE] Scan task 59F640C0 finished in 34s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6eb2fad82c31358a7389b9d2d1a04e42bed7061f 0xf1a59afc7e861d7dab32aa5330f9677040b0d56f 0xff119abb7ca69c23d68f691863592070201cd40f 0x87581e1540ae45056c0ed59530c783a6e0a9c53e 0x09829a5046bc1f493dc2a36894c7714766a723eb 0xc802019f35a1a94a6dcd6a2476876119e9008e94 0x65f866285b99eb68fed9bf28b4333387b2e62daf 0x6bfed9fb2e9e26dadd2af1ce8b0028ce3486feae 0x3e34b5aa54fd679fc54168bc002392cb9ea6239d 0xd5ccd7d47f293d3dd0ba50c582bf4ff86acdf862 0x471b21a70961528fa0e194c46d3c48e9579d0b7c 0x4fda6b8e4430a80f8cabcc319511daf59643586f 0x9f106a1902af8515bacf7baec5380b1fcf834466 0x0ffaba8706277a1ac0abc844d5454e07c17c47c7 0x37c43bd11e21ac06cb1fa0b3f1c08cd2db702b74 0x3fa33c3cf57ebf97545e56f118432b9e49da2f38 0x22133940dd65fa21daf1aef0f6baf9adb313f4f3 0xbd8080206428dd3ea3f38fe8183784f38a1aec6e 0x7100239a61371e66962901af982153b1756d2366 0xfa047a91e1841b166c9479f9dc51c355db60b2dc