ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D63368FF6DEF
|
Infrastructure Scan
ADDRESS: 0x1cde8ded1b99c8e580a88bba3f3b94247c69eeee
DEPLOYED: 2026-05-05 00:42:23
LAST_TX: 2026-05-05 02:09:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Debug_Mode_Persistence
VISIBILITY: INSECURE_DEBUG_CONFIG
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0x1ad5409d successful. [FETCH] Bytecode size: 8207 bytes. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Allocating stack frame for EVM simulation… [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Balance check: 9.67 ETH. [TRACE] Call sequence: b72f -> 4da2 -> b8aa. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xad6608980bba901c75362c487050cf2351f4ae16 0x9cbb39fb5a1a4c527b9f4bb89fd4d06938931cbd 0x7b4589771b5ac9d58e90db1abf9a672d4bdd50cc 0xf83c0f7f06c53fd4ae488f8dd1e6412f82c2e544 0x813095e7529ac13582149824d2dfd4504db1a0e5 0xee336e58c5071ac750120f5dda5a8a5d05d1cdc4 0xde7fbf5409107f3612c0825a6e8ad926b1b628e0 0xa80deb8f9e8e3b4780218d2e887b0246883c9b5e 0xecf2bcf8f247b6191c159b98447df802ab047c13 0xba8803462a4e21fcbbf2d0d1a9b6c82b9569f323 0x8965c59e0729bc37a8c14f965ae560221c4131a8 0xe7148421f2c3cb45a06d6e6756b3dea1eecbbc19 0x14202601d68781a6e5993462a2c5e1482d2121e9 0x1a7453503e401e2b29fec8308b1d99ac1c90d874 0x55d2d91a2523066c03bb2c481191700c62ef2e56 0x5f6710bf78b09a1dee52eb2278f933f440253dfd 0x329981623b42ac495a6fd405573bcaeba843b8e8 0x7e93686c605d61f39a2cebdab8094e43ed42f716 0x3046a1d9d65519e8c86742bed424b96e077b460a 0x833e84ef43da48416df6c046c7b803602a3095a9