ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7868156ED953
|
Infrastructure Scan
ADDRESS: 0x1cc582dcc47ff84bad0461c55966858e96623c66
DEPLOYED: 2026-04-26 09:26:47
LAST_TX: 2026-04-29 11:58:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Requesting storage slots for offset 0x00… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Mapping internal logic flow and branching. [MEM] Virtual memory mapped: 0x0000 -> 0x0081. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-6C9585E6.log. [VALID] Data integrity: SHA256 verified. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc91262c04e00dda3e8137008a38540b894e38a56 0xbd6f652f9149911452452a48a91fcc69bb0665ca 0x3259b968be38456ba7786863c0adfcd9081cb211 0x13bd70361f5b99c8d618d7c57dfd9235c549bf62 0x40081324b66ac91692a5f242e34d34eb6ea8324a 0x387d7b75e0f6cba9bfe358c83e775bff19c94fae 0x027f5eed8c0f8b9d8e68f60dc437175af7b52ff9 0x5ce83f0576cd0f73664fac99e40aac4b671b4134 0xf7cf310a7d016332ce8776c4da8633eb8e04d482 0xf9560f5f075f0aab3272604ac30ebfae2389221e 0x4915721ee9d674a29f617bde71a297e00211fbce 0x19e13903a72299ac76b21025941052f4ac0f4c32 0x46fe04c05172425e005a91ab5ffa5d7f91b3e018 0x4663a3bb44c844142267bf1ac85f888cc0a99906 0xc50a2e8cf90d6c5b0830323994be3e8bd0c101b1 0xd3e6c3a0ca9a52534c64cee1d03b61f11dde33ec 0x1ad838e0b51d1b07b399893a6e8a5388edff0c9f 0x27c37578e102323c9a9d9d4bd39b6bfcabd3b9bc 0x9640c8dd3b96fc35e08ddeba4d04637ba096c426 0xa21e2618af310667fbaad36449db72aa3a667bb4