ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8A10D2A219BA
|
Infrastructure Scan
ADDRESS: 0x892ba50a7c7666ad5180ebdd05ee2459c46412f6
DEPLOYED: 2026-04-24 16:49:47
LAST_TX: 2026-04-29 18:19:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Mapping peer nodes for transaction trace… [FETCH] Entry point found at offset 0x6c3c. [SCAN] Analyzing visibility: 1 public, 3 private methods. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Reverting transaction at PC: 7008… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] No critical memory leaks during simulation. [DONE] Triada-Engine standby mode. Load: 4%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xdccf6426a315128ab0fac5268bd6fd9ae39677d0 0xa9d49a1cde995c3294e9fd8deda525b1d438059f 0x29d41770d9f34b779a5d865ba850af4347928480 0x4df8bf9485bc4cbdb9d4c06b9723d17ddd17324b 0x7262e689f357a9d1f9a87fa16643f0c08793598d 0xb6ed57c1581b06839b15d6c5277e3914e9fa2c1a 0x1c46e225b19fc46eca9858d67a92f13390953f96 0xba1e4f67618d519f523f8edfb3855dd5ca09dd6c 0x942c0c3b2b0a65375ac1fc475e1fa336560654c1 0x3cf39b509458e713b49e5198533f28759abdafae 0xbfb719ce812fecaef594c8b5f1373c4e86e03426 0x44a79f903bd642699efffddd97d7cb33d12c1bca 0xb50bdc00412f7dc0be7a6701f2e9f1a3bc94c7cf 0x030946b81e56b1904d97ee5bd57d403edd19c0a4 0x3cb0fc722b462f864b6738c9d6cd591d0603ceb3 0xedcf1925188fca705b973f4015d9e448d9655b92 0xad94667b113300ab256752244e2a1d78db1c22d5 0xb57d72d038980b601b251b3afb0ae6aae192f9cd 0xe545803973f9c7287161082a97b6f62b6b890f08 0xf3d0fb5e23a71eaaed6ee2df992c9c411b374a07