ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4E9CA412F209
|
Infrastructure Scan
ADDRESS: 0x560643920115bc7ed51993dfb77b0b3ca5a27614
DEPLOYED: 2026-05-01 19:31:23
LAST_TX: 2026-05-01 19:58:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Allocating stack frame for EVM simulation… [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Fuzzing input data for 64 iterations. [TRACE] Bytecode segment 0x99 analysed. [VALID] Finalizing audit report for 0x560643920115bc7ed51993dfb77b0b3ca5a27614. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcb9a81d340e4783e1782b579e27c003bcb13d6e3 0x9ee1b3657e15fd6f83617a536fc7d815d78a3462 0x8bae5c71d328082638b8c8608a2ad3221195dd10 0xf5be837f1e73ab0b7177062ad7efdd313a3019cb 0x149b12fe01155b73c3b75d9a72deea07979cf1ca 0x5cad6bf583d57921889a511bd948b7348ba9dc98 0x1be0883386f9d099bdbf4921c693abcc6ecc0b0a 0x6ac3f33ff6cb4cb22bc3cdd98948b2ee4c6c37be 0x975ce7ae8c72b36050035777dc4735bcc58a25fd 0xa0bbf26da199a7c68dee297349fb6e9325bc4a64 0x663d09c13e113f5eb31f21fbcfb880ae37a823e5 0x8b8521d2e8dd1a587c39eace3a7bae7bc83456d8 0x09c272b72c9486a09530517c6b79c847e3bb1c83 0xd22f9b8a319fb0e626004374434b4799ae21d4b5 0xc9cb8daf5e26100749505ac815a020df892a7080 0x56067adfdf086e79201a1a81cfdc6d73a2c39a39 0xad484316e1aed090a04139074f03de43d5c2da49 0xbf54c7786d58c2e0425c632f8a24a60af6df76bf 0x572ccdf46949051d6661c8d68507edf5432a12eb 0x93e4c7c3d463a491274e64229219e35e992df6d7
