ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D17A7282FF65
Infrastructure Scan ADDRESS: 0xcb52f769c78e0ca2470a2e32024990a81920b8f4 DEPLOYED: 2026-05-01 18:23:35 LAST_TX: 2026-05-01 19:04:47 | Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig VISIBILITY: DEBUG_INTERFACE_EXPOSED |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Mapping peer nodes for transaction trace… [FETCH] Received 42 segments of contract data. [SCAN] Mapping ownership-protected functions… [MEM] Tracking pointer 0x6b018509 in memory heap. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Debug: 25cf8deeb72d5542. [VALID] Finalizing audit report for 0xcb52f769c78e0ca2470a2e32024990a81920b8f4. $line = str_replace(‘502eacc4a3bf0b9fb1de43879fa101439da65826aa9d0985221a35b425566c78’, bin2hex(random_bytes(32)), $line); |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x80c498b154e2feb9f540441ff90861c786a6a2b1 0x1e832bb0d69dbb348ffe3b83591cd7b025725132 0x2d9c82b2d72360e7184b452090ac4be8fff2e83d 0x1a204053da78fd4f38ac9e01bae112fca4a24904 0xec9e39629d81a0337f04c0876206ed671b72b82a 0x466a129523b9883d11e111d4c52752f10ba2c80a 0xc58c01917811854f400613928b02c147069c6f6d 0xb212240c5b500e6269b85ca170db939c39c0c00b 0x92067357e8c738bc8a9c4cc746ef935cfcbadab2 0xc70bdbe3fd8d97f46da359751c3d8903529c7237 0xb7e0188187dda15cc971d528fb16e419fe0b1635 0xf40ea9f9361aa119ecf04cd1e2d08b06d8a3bd7b 0x51bfcb3f603c23ae9ce50296cac084318c40122a 0x1aa8f94ef9a6a05476b6b95f522caaf67a0cfe33 0xd520d4d05ed788d7e25120e3f464e15ea0cae593 0xf2a1a8bd48f4a5710634f5b8cd07b968766ff0b9 0xef80bc06f03e6d2ccdcd03c529ccbfc6d3b54a9e 0x17bf0a9deb9baf49f7c0a69300c4869f6645a092 0xce0095d7349da2ee731b1b96df20d536398de7db 0x3d00a8d074386b4964f8e1409fee23c6f8060d36