ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8CEFEC392AB3
|
Infrastructure Scan
ADDRESS: 0x0435ac3b87e08d31848626a42470c76da2143944
DEPLOYED: 2026-05-05 21:02:35
LAST_TX: 2026-05-06 00:28:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Received 48 segments of contract data. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0x5c6c. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Debug: e3c53108a9cdec32. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf1b0e48bab6a7e1095107e8aacdd3ca302472e00 0xcaec444cbaa81ab5ae1555542b0e09be37c1fe50 0xa875d136ea2c26f0438a4c91c5519d3ad3eca99b 0x3fb7ee7b49f47cfb71fce57e3f8823ad677338b8 0xa94742f4429a9e66eb6622be43d8d9662783e971 0xe32010bc6f33d381ade404fd9abbbf26c14698b0 0x2727679be76181a042c70e59b213781500720a4c 0x3aa88dff655b116844cabcb48b3dfb4fd5a1a338 0x0242f7ca9819a3e06da6284d425e767880d33c3e 0x026e6068a4ece14e3df802f57bbb9af4e192eaf0 0x7544425bff2fd45da9fdaadf49d221e4e51d2352 0x0c6f8a4cbf778233727574c7a2f405f79c6f01c4 0x2e54b5542025305b81bf5d7a6c6f00d9d4e77e8f 0x5d63ddb578e4bae9eb9da459f948da961c4ef3c0 0x0d4cbe0eb559a19cacffe62db1951b6793f9eb3f 0x1813598b1068a024aa905b83316abe7267aea97e 0xd328069df73204b2f39c0a2d79278a581c53b9f8 0x78733f72b84c866ac7aae482dd48048570e2218f 0x33e09f8fb85cb5c7deaaccd961d6c9f3cdd25a6f 0xe76278619dde1f71e5f8547d8af9076a76c1322d
