ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8A7FC978AC27
| Infrastructure Scan ADDRESS: 0xf97659621f071bf775f68f2441ac10cb70a6c5e9 DEPLOYED: 2026-05-12 11:21:23 LAST_TX: 2026-05-12 12:32:59 | Compliance Status STATUS: OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate VISIBILITY: ELEVATED_PRIVILEGE_RISK |
| ◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Entry point found at offset 0x1c1b. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0x699a. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Mocking MSG.SENDER as 0xa9cd314ae05ed8842df9951a12d76ec3254726ba. [TRACE] Bytecode segment 0x36 analysed. [VALID] Consensus reached on node cluster: 6/10. [DONE] Report exported to IPFS: f2da7e20…3c2187d7.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe74f402a589f6d4795be1f4e9c3603ccaef12d8d 0xab42c3b2fa0257632cb66838fda35c36c8729e4d 0x23319c4bef34c7437860bde19dbed8e91282c74a 0xacb75f45c713be6cda87edd75d335dbe7748e5db 0xc6f839a4f0f6c63574f31f2fb561ab5f6ff10db7 0x4e4f892102255de3e56335644585e517d20bdd6e 0x2e62a0191e58de93a30431cb38d6ca2f161ff3cf 0xe3f79e29fd68a48f231ebaf4f778c9ea528719dd 0xfeb5cb8635539a8466325de2fe709a0c201cbdeb 0xccd10e76b65d0521bccdcc175db8eaebebff4b36 0x968b576b1fd59663816376aa061babca4333377e 0x532db12a8c50be5c38121f80fb181da394ed1002 0xbcc10bbf8b7de5ab3cfa496ae6ec66b3cec77b53 0x46bac0b6705261b5e0895aa0a362c859d09ef3cf 0x3293f5100d329260014c8616c9a1cfbaa78460f6 0x9454262f710c04db1c5a1e016a3cc038857660a5 0x3fe2af1df2191bc40b0f415cc74af60f6d18e07b 0x0761a74dee273c23bc43551700fde684084dde23 0xaa2a8ea803d20fe62d25a9d15d705c63acf618c5 0x273ff7d8d3b1ef342a6bb805501af8e41845e62a
- This author does not have any more posts.