ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-339D92E0E987
|
Infrastructure Scan
ADDRESS: 0xa77a5851223ae40206575cf7ed2a3d07fd359815
DEPLOYED: 2026-04-28 19:00:11
LAST_TX: 2026-04-28 19:16:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Entry point found at offset 0x6167. [SCAN] Mapping ownership-protected functions… [MEM] Tracking pointer 0xabe278f7 in memory heap. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Mocking MSG.SENDER as 0x1fb6574995098ff4e69dbd7e304d965cbcd9b879. [TRACE] Program Counter (PC) synchronized at 1298. [VALID] Security status: DEEP_CORE scan finished. [DONE] Triada-Engine standby mode. Load: 2%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xfad0ce6f0046231470ad6a2f3194100143977a5a 0x56773e071f22b4d57bda95bd26d72bfbcbedf285 0x397a2b7ca21b714d315835c6ec5bf2ef942f0222 0x12a2f8182c3d39f17006f217c2a41734ee6ba7c9 0x733f9e4e8371e3bc800bea436c1a35dd83a6933d 0x46d5c4135e35dac53e2a04e0611e29244a0422f5 0xd8008ea9b7117b2b62fceb01b00868bd7067bc3b 0x9437c0aa66c8eabee4f227c13795ada36242d7a4 0xa56a1aa127a12ae75956865155a044140cecd80d 0xcd6c311e94b49a53b7faf483110c23e6e687488a 0xad170c2cd4f2919642ec85a76dc097ed07d58fec 0x24a99c32aab248ff37d940acf2951a87c7596e97 0xd316b8b3574f19e32535fa0aacee00990adf0c19 0xa7cb168527b0d6fa4288f0195949385297c20f72 0xc4a0bd7a2f397e9053005d51ed39045d50c6d4c6 0x307f24260e2c889a4ecf558b0f2ec3471e6ac6f3 0x4fb1684ae616b7e8ef8a9e5001a260546e0a52b5 0x9aa23686dd81be3da97f8e90c6675bece842b432 0xb80c4f6a406bb470873ce0d0a1deabf21fb43d9f 0xf19a9bffe505b06f2927fe68b5c72e0b63c44192