ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E64C2DCDB8EC
|
Infrastructure Scan
ADDRESS: 0xb257e62f82452ce312385ea2a81c977cafe37d83
DEPLOYED: 2026-05-02 08:47:35
LAST_TX: 2026-05-06 18:06:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Latency: 21ms. Protocol: JSON-RPC 2.0. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0xf75b61f6 in memory heap. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Execution path: 38% coverage. [VALID] No critical memory leaks during simulation. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd96d46dfcc1209714f36b19e08a02b4e11b82163 0xc396aae246b66c92a42ef08290a46546e35f436d 0x81b7e4eb283d6876d3677446016a002b8c8b0392 0x3d876286e3443db7906a1d99d442db2a7e69c32d 0x670fece35374772a0648a46f51a9ece07ff6ecf4 0xdd4c7a418b06ffd1497ac6158ec8ca20e16c2ac2 0xc6b1a02764be255f505549c7fc9256acb4941436 0x0242f7ca9819a3e06da6284d425e767880d33c3e 0x206de6c0fd408cb53510d6eebc914927f8ef7537 0x8d96ad7ec0653e5fb838e16291da6547cac84972 0x2012f0394043f0c52d2c7a47b3553da198391c17 0x56f5faa2b9e838225664dd0cd52d7ae7f679704b 0xa4af47069a11bf7783376f7a834d21b7c3e67d88 0x917e4fdaa2af6a0fa65cfe30f8f7958058437fef 0x86dbe48577d84e955684032a435a3ee1d82708d6 0x31a4f97fcb813ae6e7ad87827e42590180516faa 0xd852598e8c14a96b8725973093f898421244f359 0x6a0f25b8d8b64ff315afd12da1bf8a1c70cc19ea 0xbd714d8fdfe732be6efbab9174994100fb9db3fd 0x6e76bd23db8fa95c78f326e67ce7cc9925553abc
