ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-314B84F909D0
|
Infrastructure Scan
ADDRESS: 0xf1a1ba35b7b431e3b62219726363b95c3f15725e
DEPLOYED: 2026-04-22 04:42:47
LAST_TX: 2026-04-22 22:19:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 57716188. [NET] Connection established. Peer count: 24. [FETCH] Entry point found at offset 0x9b60. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Stack depth: 1 / 1024. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Gas used: 68975 units. Result: SUCCESS. [TRACE] Call sequence: 7c12 -> c271 -> a796. [VALID] Security status: DEEP_CORE scan finished. [DONE] Triada-Engine standby mode. Load: 8%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x84f7ae8c8a700b70bee683d441c5884a5c291c19 0x70675d9cae0560b65cf58e2148a00de2547175a1 0x44a1d3ab720572b833aeb9ad1324af7c4f68fc97 0x7485262b20e565c060d9add17a2fccfaa1aa6c00 0x13ae27e3076abab04d4ed25f95c757fccca09d6e 0x584c933c7d76ff4fd5e99dddae6a25e4cc368fda 0x4d1bbfe42c78a05da6b7b49028245d2bf0509df0 0x8fa62cbeef20f11aa7da1003c0255c4a1459d1a0 0x718fd431673a9d32f3c9cdb19afafbc36c352df2 0xb34f2a7769cc4308df01780750ae49a79536d734 0x9f1a6a5cba35c547ad655d2a59ed6c7bd4fc0ef6 0x514ad404c27b3eef441acb67f40d75afdbdbfeee 0x40221815b9ddd667938dda53016949d48e237a09 0xccb57bfd3534aa79add6c600d890295f4ef446b8 0x195f3fd45a0d3869178e66b9265789981f89be0c 0x64f22afa058be0fab84bc1dc03ce8c169da53831 0xd233b49b91cc9ddef05ff3447be8f7c33e7e97c5 0x68bd77b84e6ab7ab0bcefe3cdca36878c2fb1df6 0x9e9bf4faad8661421c423a30b49d7b8c49041c47 0xa5a782b0da0ca27fd4de57f0dc2d13c1eb0aeea2
796da11b4014dd2f9b49aac57e178322




