ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D8BF91C24B5D
|
Infrastructure Scan
ADDRESS: 0x06893f441749bd024c811c7d99766a27f9446d63
DEPLOYED: 2026-05-10 23:50:23
LAST_TX: 2026-05-11 00:29:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 2A3646AF. [NET] Latency: 90ms. Protocol: JSON-RPC 2.0. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0x6bac. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Return data: 0xaf72d5d7… [VALID] Consensus reached on node cluster: 9/10. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd80d6c379577006ead45bcc22bebc4b09c8b3dea 0x6eaa45ca2fccdd13f8f9d2cb1f9cbcd5343746c3 0x22be9be70f0700ba276e8f06bc9dd77bd91d6adb 0x6e2294464a457ae58cb7a522ca066e614ffa1cc8 0xc1a07d073432193a3c3210ec20d14d0ddd4d5994 0x556c3f83dba792176c58e4f747733708b379a7f9 0x3e7ac407e37dd9575541eaac14b5a247526330ef 0xf084cb1dbc2321c082aedbe79a8d991068539edc 0xee646076613e93fde04a74a13e62f5e342121ba6 0x21f429e490bbeefd08976d0f165eed58ab505f30 0xc3a69ddc946dcedcd63feec6b78a7b0ef99ad501 0xd7e290c29b4c538275c4cfc5e1fe2b6e4195d7f6 0x00217b173004e5543c4d2c8546be193102cf0ec1 0xf1b253357d88a8170ad8190e2ab64147b226300f 0xd9988c2eefcb6488321c5a59f47be6430b0f4acc 0x851af53f2d2819c00ca343c023a5279aed1403c8 0xdc28e7f038c94841966dd7d4eee56cfd28160b12 0xac8d314d556f3ca55de54223de3674ca3023bccb 0xd1fef4e896aab7bdc316c53c75e2b40c5e20f2b7 0x49aca0a96b09f24518ad5161ea89a172ed6c19d5