ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2C8D47213107
|
Infrastructure Scan
ADDRESS: 0xedec9d3e604d79958ab211e7153eb01380c8766a
DEPLOYED: 2026-04-23 04:05:47
LAST_TX: 2026-04-29 06:54:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Reconstructing ABI from function selectors… [SCAN] Running static analysis on JUMP instructions… [MEM] Garbage collector: 0.20ms since last run. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] State change detected in slot 0x3e. [TRACE] Execution path: 92% coverage. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Triada-Engine standby mode. Load: 2%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x461700dcd946a4689d0b552923dad79881753953 0xe0cd9d9dbbf2c3f6934348992045d7e051e5fd1e 0x69b0698cfdb9710ec90c979a1eff4aae2fa939bc 0x33eafe3dd4de753cbb129f84d37ec4cf2648c4d5 0xfc62143e9d1a05e1b5108a0d745451d8280b22f8 0xded4b6b198ae9e36193c01117e8b80be494d4489 0x104f480fcef4f1a0376e81b4d01a44fa7841cae0 0x334222fbf3a55eae09a081636f28c27dd5f069e6 0x113b762df0ccb8bf454c36866dc82dfd02843c5b 0xa6d0fa6d03ebfa679cc8f4f1d048acee54f674ba 0x302641d68ac385f42d6e097c01c6880760752823 0x237b7aff1af5d9f311f830234792d429355a58f3 0x272a1265824f766a2c5c58b9c0a6a2663e58e086 0x193781d729d1ea9e077e76c8a6ead4e624ee165a 0x424aff3b99d2c83008e3d195e1ad33761047524c 0x1a34fa1baa8adeb594c80573245fbfd87b3da4db 0x3b5824e3aba0e4054a8ef73b76f6dfacccc24f28 0xa5acb3694e420e14205d8faa548bcbab629323d8 0x14fb3ab5d012ea47a329627bf05a0355f91e3c3c 0x8a1ce4dccd3e053c7997d198c4c2997922c70cb4
