ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-DA197DDB2391
|
Infrastructure Scan
ADDRESS: 0xa8ccb12e68423dcf72730ff43c7bd891f5dcdc99
DEPLOYED: 2026-04-30 02:48:47
LAST_TX: 2026-04-30 10:48:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Synchronizing with block height 19350. [FETCH] Bytecode size: 1552 bytes. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Snapshotting EVM state before execution… [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘e0753873…b817658f’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe2dc306c84d6ece09fcd626735f6b3abd7d2d4ba 0xe96e2ffd275242a5c692487adde636e75749221b 0x15992ed985559bc4da460fda5aeae5a345cd2533 0x904256a94937f12caeb7039f959c5e8391d06096 0x708d82aa178e42ca32efbe1af815d36b5aaa1498 0x6c9e083b17e467bc6c95ced066c755b26950eba6 0x98c48f58f153a25ba0fff3837f2f5ad3487cf549 0x9b3b53b789ed7a9c5294a4211d64ed24d41f9e66 0x8a970ad144391c31476b38738ada5b2a7d267522 0x173c3f2ea0733455d96363bc1324082dc51e31b7 0x3e064f9b04154981bc2159f197bb5d0fb8918f78 0xa6045d8876965575dd4b07cb99c5ba384e84914c 0x79c0d786ecc1fe6e860eb15495f804eda7da2b8f 0xa5443ea6d66c65ff1c1963d74c6d980505aa997b 0x20acc0891486d58d6af2216882efd700e3444dec 0xeae5509ba68cbfa8c161406ec43abadf8e7aaf55 0x7dca621183fd4ff6425e0580a158c874a156f2b4 0xa3f7831d00175099f272c5227df8bf7b96d0d707 0xb9f44e37f7f43e76486e37c4ac5646147f64f369 0x2202dc5a83830c0e8d49f85cd7d8d8fc4796b1ed

