ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A35C9E472F97
|
Infrastructure Scan
ADDRESS: 0x67820c9e1a8afba469cb4503086d2266055c8cff
DEPLOYED: 2026-05-17 22:57:59
LAST_TX: 2026-05-18 00:33:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Entry point found at offset 0xb83b. [SCAN] Running static analysis on JUMP instructions… [MEM] Tracking pointer 0xc4d52af2 in memory heap. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Reverting transaction at PC: 5868… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] No critical memory leaks during simulation. [DONE] Disconnecting from Ethereum node…
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x73771b8c053db84583d6b8520b7a2631b1cafb75 0xf3ea8a98cd2f7e5dd29e8efbae83102a7e5d704f 0xf3381b259b2fe142c0a87bfff463695d935d6f66 0x766081088a823a72d9d7eee1c2de9248b78be598 0xbf7f8bae1d0b6343ffdf2f5107546eafccbac7c1 0x236063260efaebeb9a34eed582a217ba04bf14a7 0x7559daefdeb445c6e3126b7102906a401f09bc53 0x469ff8d0c718bdf8653da9fe661018d7600edea6 0x043ea708c949fb6ede2d577e2474ff41a521a939 0xd215baa44cc07106b41b64c1d6b68ecd7692f94d 0xd9ef7e2c1e950a91a56a4ec7768fd48cefd9560e 0xd45f0bff0deb99d3d69700d797ceedba259f4230 0x7dd7c9094113850de054598c8a408001d93e403a 0xf5b6b5eec5d4a9530d637c6f8d712d143319d030 0xcb2fba3266e257adc4f708ee434f32ef36ca360b 0x67d13691126536cf255ebd721cfaf9f40589ec3d 0x9cbf36b98676567577f59531ff3f9f7151fe5e10 0xc5a7244b38ed1386b1fe45d8bcf478df1eaf2328 0x76d7bb326d45d7f42b4df8b725d8d2fb51cdefe2 0xee5be054b4e711ba20b5f4bd040d6f18c5b6db78