ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3EE56658A702
|
Infrastructure Scan
ADDRESS: 0x9c51a3cb5094b26aa1dcb380f3dc7e1a7c681c2d
DEPLOYED: 2026-04-28 16:11:11
LAST_TX: 2026-05-01 20:11:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Latency: 89ms. Protocol: JSON-RPC 2.0. [FETCH] Metadata hash (IPFS): 92b08ba6…264eb04c… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Initializing storage slot tracker… [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Mocking MSG.SENDER as 0x1cc81c3773c67208553cda9ac96e2f9824fec6c4. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Security status: DEEP_CORE scan finished. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x717749db46c17e9becedf658e1db6bb25eba94de 0x918174f772207cd17b0b202403a71d09d9000cf6 0x4f1ea959d112e35f9317258f18b704d03e487c69 0x9e2d96ea51c302cce4e7091fbe2a1494b1be936b 0xd982ddd7cacb179d911635051ba4c82932e483d7 0xc44d33391ee799dbe3bb339348ebd76653648ebd 0x8209815136b35f21b8c0f5aa2e2f915a73530df9 0xa47a7fd2cc2250a979a53d16ec3d5e0a264e5786 0xb68c17d5811cc516be2bf9c92e68d0866b482c30 0x77a2ad36804e21605524bbc6dd312f5e771045b2 0x226845c2ba216b8bb1aaadfd4e14de69426c5445 0x68285e4ca7d234cfc5f48834a4796b705d239dd0 0x4f727daeda88400209823eafcf9df7f7f243342e 0x2d91a45cb222a7029882edc2768213f491b0acbc 0xc5944fbbccba3bc6d529dc4b8d90f6e3a0d02be0 0xc1d54af951bf95dfafcd9fb27263ec40ede8fd79 0x1589b7fec8e7fb48a83f3468154fe7231fc38f80 0x072932d181262402ab3e0e3e1033cac29c3ed845 0x7e07a656728222f0f0d03ba075840d02bfbc0ce5 0x4adcba218e3f6615c642b4ede6c22a7229330e33
