ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A653103362CF
|
Infrastructure Scan
ADDRESS: 0x4458d1894bc15754caf3cdad66bfdf41794b618a
DEPLOYED: 2026-05-14 19:27:35
LAST_TX: 2026-05-14 22:05:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Identifying function signatures (0x5a940c89). [MEM] Simulation buffer: 1024 KB allocated. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Debug: cbdefb21aadb15a9. [VALID] Generating cryptographic proof of scan… [DONE] Log signature: 2941b5b96756c7238dfef7e9c267bf2dc23ef3531486274533e0de280a31f685.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb653ffebf386222ec1425582403de2223b2a459c 0x90899a6b71f6379a0468683739edc8e730fae754 0x31f8b10043037a4493ee0b694fb508812203e51c 0x7208e12593b7ab2f0f19bbcaf3676aa8b2adf112 0x702d240ef456028f293d9c102198bf616c1f3e33 0x74b82144ec80cd2e06ad7a3aedc59b1759c45da0 0x76f0e95c0e5c9ba26289062637c68aec1199ddc5 0x32e2303989f4343c1b9ecb2a548f7ddfed4a58c6 0x265baf8119deb1a811c2650fabc203c0c557d8f0 0xbf8a140a4c30279a177bd007ea8f46b82bec3763 0xadf343e1cb4e6d14a8e7bf79c4a27ebc10960315 0x52155393ce1a50d0782925efb10fbc79fd5eb256 0xd8247e71a1c6212564593fa0be5faebaf44a9d18 0xa1cce38fee6e64513a23c104f7a34358a0de4e2d 0xfbf00193d2aa92e648e7094dcbc5c7cb679639e6 0xc8c1fa60a15bab4e2b540bb137813ce99facadef 0x15011208ff6704d0778f62457ab5a2028d14362b 0xe23a3e5671acf36a767520d72f27af67927325de 0xd5298a423f8ccafe6d82f5761752ec872e76f9b1 0x329ca146cca7fe2c41fecd83059c63c96ff70ec4