ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1DE78621F6AE
|
Infrastructure Scan
ADDRESS: 0x422b966f89406ddee5dca1de55525a989f814903
DEPLOYED: 2026-05-01 16:57:59
LAST_TX: 2026-05-07 19:24:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Mapping peer nodes for transaction trace… [FETCH] Entry point found at offset 0x2acf. [SCAN] Analyzing visibility: 9 public, 4 private methods. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Reverting transaction at PC: 4123… [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Security status: DEEP_CORE scan finished. [DONE] Triada-Engine standby mode. Load: 3%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x02abb6151b2fac4bb125711dff67c943820174b2 0xcf3a8649c4cc837279176dfa5232495f83248828 0xe8534dd608b3a1c0e8931ca18d228be4360b309d 0x9e86066f2b4d29f19dfb10dd0202ebbc26738995 0x5864c781af761addde280082184ffa32c17582a1 0xaedf59ebaf7789fce314e1cb752cd4aeb337fa1d 0x9c9dccc6195bc8a079d0b8be23f65cf44c4a56e5 0x4b84e79406f25160a67530183d36d88f84fab5d8 0x6add81b2fe471da6f2cc1daa1255a62508c61f71 0x5ec588c578eeaaae8df8e41dca3b6442d5e016be 0xf6ee6766e65f5cc809b5e22d7e803683fc7af72d 0x5a52d5c03bf73338f488433aaf67fb50cb1346fa 0x24b19bfba54af9d0622cb20ee26311535a4755fb 0xd6920c61139f9ba1cf701991c114cf7f828610f1 0x8e01bffbef84f5d8e2e1e203d0160cd2239a7cd2 0x216e5934c277f98317fcdd9abea5a0a266348bb0 0x2e173de013f972cc710ebe555b67b0dcf032d2a4 0xe59a4954bc3f969225781af20f17182eb2118116 0x3fc77a4b5652ee582a97c3091af521c141c5c775 0xe7e577600690a04ade409fb3e22c3af13fc60110