ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FC4F9CF520B8
|
Infrastructure Scan
ADDRESS: 0x64121ecb5e12fde986bf964829cd434cef13e418
DEPLOYED: 2026-05-02 04:51:35
LAST_TX: 2026-05-02 05:30:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Identifying function signatures (0xdd74965e). [MEM] Virtual memory mapped: 0x0000 -> 0x45ee. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Simulation completed. No state corruption detected. [TRACE] Debug: a8079d850b87cdde. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Log signature: aee32c11a52000ec16090fe8bd26822380db4426769b8e7e152dee3bffdd5f56.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd14f5d4582fa0a9468627a4e19b6e4877576889c 0xb4a5fd1371073932d95090bb0cef553050d3f48c 0xbdcd3f65f7cf05095b8aa93ad1ebce1f3ac3a0b2 0xf640082c8dd71832dfd58f81ac33090593ce1670 0x21bdce75878aabb157b01cfac597a3d6971c5150 0xc44328da46c0c867e946f5bceaa38cf1b9edfccc 0x7c7cedb8a08341ad2119f787a0c42b53ed41bdf7 0x589dd43e49da95eecabdaffbddc09cdeaf4e2a48 0xcce4b7fbf9391798c9a46e948377099bce4a8bb9 0xfa387beaa40365d1ef988629fe624490204cf1b8 0x2c5f9481d27046be99d4115ff08c70d86a981139 0xc4e4e75fde67ca84b97d20bef43b37d4d356d16d 0xd61eca67cb61b8c2c9ba11e99ce20c75948f3636 0x3645f5f6686da48bfa67c92e5c0906a3c552b9f7 0xdc0c5306f81b75cbfe6b5fdee825ba0c2f6470d1 0x275d0e5b889cc2c7dee05d082645b9ceb1b6f109 0xadecb38b80cfd84192ba45aadf0ef39c2fabedd8 0xe3c36bb5696e12cc818e698edff167271f6d6d79 0xb7e8a0339d56b849a90f3a22697943f389ac2e6a 0x5a049cec11c664f642c3e7d1f564aab6a9dd910e

