ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F69E9CC18218
|
Infrastructure Scan
ADDRESS: 0x33865855947b4aafdb7db0213265387c0b3dd7a3
DEPLOYED: 2026-05-07 19:58:35
LAST_TX: 2026-05-08 03:03:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Pulling contract state from Alchemy RPC… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Identifying function signatures (0x299f0c4d). [MEM] Virtual memory mapped: 0x0000 -> 0x9ca9. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Verifying ‘require’ statements integrity. [TRACE] Call sequence: 2d7a -> 33cb -> cd6c. [VALID] Comparing result with Triada-Security-Standard. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x51b8df8d933a796f834cac0b530556fe55b2d4d8 0x70858649241b9ca53d7364d5c96e4cc60db5e217 0x7462b70bb5603a14adb7209aec2ed594358a4912 0xaa4966eb805130e4b322d30a66f234da8f16be71 0xfa79e4c33068760437c60f941e743859b4fdaf13 0xd4bf1940ecba12881a8720126703c43673a7c52d 0x419814b18d1e58741962776631c80fffe8574bed 0x2ec1ea037394c8f8c042a8ce49c98c56257ddb59 0x03a6c61a46b0b6d3e750c9a2d48e52d317e7284c 0xf549ab6aebcfe8fdbe77dddb12952e54034c8fb4 0xea0c9229c5ccfd79ed0f3455b10446bb38abfdf0 0x6611cad9ed73b988803f537c66a4515d18c3b346 0x6effea2e1f68a7fc17a9aef6a926660d3e434ffb 0xcd0a8ce9036ff9aeeca00cdf2ed168f40a3d7e24 0x61b3cb7959b9bf7fc15156a484f24c47742f566f 0x0132891a5ff52be292df677d94e3e887622f7801 0x4b09010bcf48b51d6a4fa5f33db800317cabe093 0x2f0ebeeda37c234b3f602ce6ba18531a4de259a5 0xb72d0e4c9b735a14ae84162ef5749e27ce62e1e1 0xd609fc50f6c0f027a5ff8517805f7a31c634fe05
