ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-609692C550C5
|
Infrastructure Scan
ADDRESS: 0x5314183d8782c5557245e1ec791151d6ef2b4230
DEPLOYED: 2026-04-27 22:34:23
LAST_TX: 2026-04-27 23:13:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Entry point found at offset 0x26dc. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0x60da94a1 in memory heap. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Balance check: 7.39 ETH. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Security status: DEEP_CORE scan finished. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb73b9cf8913600b716c86ef6abc5473b0223ea6b 0x1f873db6f1823ea399ebbd4d4531b1b0b3a2ee90 0xd4d6dead84a9d94b375e3670dc47ed8320d53a71 0xafc963aa4a505189e70e1d1eb2fbd39245421cc9 0xecaf2cd114e0371717063b098a55877b68409774 0x57f8e979eec50902bfafda050a52d0cb45ffb5a3 0x5c3af44c770974e7e552d88a3b0fbbf16b19ded3 0x9686e327a6f50aca2a1bea4219e04dc4449dc286 0x958d3932cb5c07dc969d44819212d67707c672fe 0x9db0532e37d7beabeb17edcb48f0a26d4b6cc5e4 0x06e5c93ee71cacca19134a99efc834ea6ea474e8 0xa8b3779d9c686ff6c5b40f61781b0ab81f65ee20 0x336520ed8e25dc9cc623620c2b7398f8017c4663 0xa2cb42102ae0145a06b125399b5b708c447ad9c2 0xab29068ad2444222f8115f7ee6769921b28ee158 0xdb516924d939b93be3cbe7770c9869299a3eac01 0x3c047b90dd55c7d277b1c464bdfde41154ae0b2f 0x4152026f4ad1b3ea713cd927314608e1bb823a55 0x4af47a7a6ffcde21ce87bc1a3a10beeb19029cc3 0xb21b3022b01e9a6841a109784ed304bd1c6963f4