ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4FF91EF96A76
|
Infrastructure Scan
ADDRESS: 0xe2e3f74d2a3f8e13736e941d93bb754e932181c6
DEPLOYED: 2026-05-09 02:30:59
LAST_TX: 2026-05-09 03:25:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Bytecode size: 5270 bytes. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 9 / 1024. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Consensus reached on node cluster: 5/10. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5bce5cbd1feff4d893c260d1d650430cbb9bd66c 0x79464f8a91900438dc1b4359bdc98b20f71ed48b 0x45ba584c61a442db6560cda2dc331df75fcb8170 0x45b66d11a846eed0e61be446e65bb343336f521c 0x3199331bcda94fb753c87764c08346959b91e84f 0x0c03fd3a4ae91da149112bafd7078a3c36c301f1 0xcf0ec902719c61721ea5378822729002abd8468c 0xd91f1905118b897669955e67355d9b552e4b4d55 0x3dc5a0c949280a4c8d16709f3bc3e760f9271414 0x26f609db4b517cedecfc9422cb85debd16da883e 0xb8eb3cfafda8bbfca0508dd541afafa61dd52386 0xe2a2cf8347b2a083dcde03b34715b6a74530b09f 0x749b87440a3938297bfc0dbcbefb9723f86cc98c 0x81fe78adf044453c60752b6cab70f0bfa98dfe81 0xc72730db36667a19a2f6834a3dec1c3ae8757b9c 0xddd37b6ead775507965e9c8d89304eb6618535bd 0xd513a9ff292968661b85b4c86216e82f53402340 0xdd1eeed73c30c0d099bbb8d98e1b037e8c15d52c 0x656d2c7a970d13073a6a58fae18f39abf31fae41 0xf267b8ad52726b03c7aec9954bc3f61fc9998f61