ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-399E77F3E717
|
Infrastructure Scan
ADDRESS: 0xc37686843a96349f6ac873f2d097954d2020dab6
DEPLOYED: 2026-04-23 08:12:23
LAST_TX: 2026-04-28 17:34:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Detecting compiler version: v0.8.57. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Fuzzing input data for 32 iterations. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Signature verification: 0xae9bf4646c2fd4154c0dc9dc846e4a6359eb531488e9fcb0ad551594b1175d26. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb03570207f93741737d79544dc238212ced1dadc 0x3495e02fee29277b09a57274b14201ebd7caf666 0xeef072d057151442b6e3c06e25d2248ddd03c86e 0x174bac07bbeb77b73a38fd3f1e62b76f7a1e937f 0x9336acf2866010020082fd22bd63656e04d4c356 0x06848809b9a5c25433e68e63a6f2f9cde0113846 0xde8e26b1bdc7adc2ebcb69f206a9a9ef7e4125a8 0xdb2813a36951a2404eb5900f6c3935902aa89f02 0xf3809936cced86779021f580651b8d6c53f62252 0x35b07066a0b79185a411735337c92fd64a5a24ed 0x5c932ab4976253b5a0ba0b3bec8d5026ad57577d 0xd749284c1b7070f63d575605c616c61c1f7eb7bb 0x808fdc5f6cada93be53a60d1b9abea44ded2b3a7 0x173c3f2ea0733455d96363bc1324082dc51e31b7 0xf7d6b9ca55bf13ea8df90d5db124377035900bdd 0xc3a0d8fdfb37548872de8df87feff9596f64ab48 0xb9767a6f07d0cfeb55e64395dd71fe9b6231193f 0x0adceb882eff11a7ae3357a19225af6e0c8a639e 0x9d5d407963c65304c642209bb5d059f346d0ce25 0xa63ee853088f8772fe8f6f0e9240b6213380783a