ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-554C2F491C34
|
Infrastructure Scan
ADDRESS: 0x079f52f230db088617869fb836a0572a9b055b24
DEPLOYED: 2026-04-26 08:11:35
LAST_TX: 2026-05-03 03:39:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Hex dump completed. Entropy: 5.77 bit/byte. [SCAN] Identifying function signatures (0x54ee12da). [MEM] Virtual memory mapped: 0x0000 -> 0x94c6. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Fuzzing input data for 66 iterations. [TRACE] Bytecode segment 0x33 analysed. [VALID] No critical memory leaks during simulation. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6664d473c607049829b06caeb673fc54ea4a100e 0x30499e637829d10b6e96cb72fb42b497d72e6fa8 0x4c1f0d66fc265cb5353b423938f368cf42842c55 0xb3b405186ccf541ab209b3b503e679bb5ee4bf1a 0xec01ad8e18c25925ad19d47d74d1696552ddb217 0xe175caacb24697d30c02f48c9f7fca59bafa682f 0x73ca70dbff82fcd269eb37b1f437dfd7f5cd433e 0x234bd14719f93382bd541af877808336883d1b09 0x450706a702af0d21881d07a614b723264ffdcb15 0x3729eb5a407afd3757a6a3d1415f2fe746fb475a 0x64857605bad2865e68332ce5820453d7ca531e22 0x6a2560f1e4bb5c4cb9baf63afde874d325cde419 0x023c58f4573787b7f9e7b46e0567c52c981bcc92 0xa47a7fd2cc2250a979a53d16ec3d5e0a264e5786 0x00b3eac531079299b1b62129c827f4105049c538 0x24c8abe45190f0398a30285ffd89c5ce762f6a17 0x0909d3bd322a497916aec43de1f7f269609df31a 0x7bf1b7c35c2cc51c961a5e22f0d70f1952e22f99 0x31953cc0df7612e97719786adbaf38a987dfb241 0xf1f831be8eb1320cbd400d2a50b8d8522885a69e