ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3CDCEE8F1DD9
|
Infrastructure Scan
ADDRESS: 0xbe277e6439cbe5d58822677701a6b7ed20e19a37
DEPLOYED: 2026-05-01 10:53:35
LAST_TX: 2026-05-01 19:41:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Mapping peer nodes for transaction trace… [FETCH] Entry point found at offset 0xf169. [SCAN] Mapping internal logic flow and branching. [MEM] Initializing storage slot tracker… [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Mocking MSG.SENDER as 0xd9a44894364832d5f29934b6ebb7bcd0946ed9b3. [TRACE] Program Counter (PC) synchronized at 8255. [VALID] Security status: DEEP_CORE scan finished. [DONE] Triada-Engine standby mode. Load: 5%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xbcfb49c8210d80cf99a5f8bd2e8c6fc1fa7209d7 0x6564397e80ffb0d6aff28ec75fa12ac907945fb9 0xcf8219e182998b4140a4eaa954e5158f67ca2801 0x6cd055fc1d822a43058c05b711b2e11dfcdf2be4 0xe5d503fda1b5a8455215eb87f64dd06b5cc8a4f3 0x4b8b99bfb553e65d8a256a9666539161bdd0e804 0x2f5bf787919f05b22bd60b98122025792194d66f 0xe6bc25475619c0fe587fd38bf94180d7d4278c35 0x297d2b4d6cf2f4702f89662c4b05583d2cc3467b 0xa838a3c62c5116686d69d072f5e30eee2d99958d 0xfcaf95a6f98fd3896a7a71b48559109a49766f7c 0x53546286b6cc09c381d4c9c2c4014f88a913a01e 0xa99bc076db5d58c901a7476ee9720326abb9ca94 0x78be43b95fdaaadba23194f9acef85e3833f5cc8 0xf4792774a13253651352267c188ad98d718ec151 0xfbed314fc5eb9bd118b729d62e0b24f8dd3ef3cc 0x143a08ac007df851353fbfd1c806ef2168e007e2 0x8f1fd3a20b256a845237bcac9f6b8f2fe1aa0697 0xe777498a573e419c78e8b712b0493155f22ad802 0x5d34d23e3c3cacf0f16654e3692eefb09dcafd8a