ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-31D5F1E5EC6D
|
Infrastructure Scan
ADDRESS: 0xf13d2480827b5049888fc72df1520d6c1152fb5c
DEPLOYED: 2026-05-08 10:33:47
LAST_TX: 2026-05-11 10:43:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Entry point found at offset 0x3677. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Snapshotting EVM state before execution… [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Mocking MSG.SENDER as 0x5de83be3e738746e8f5c3979ba8bc3c709ecf46d. [TRACE] Bytecode segment 0xf0 analysed. [VALID] Comparing result with Triada-Security-Standard. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x870fc95d2db4655a04688ea829c1556b1ca47971 0x55ad3295140015e72b2014ed0115e855e6cc9b68 0x5c564d4c49ce98dba7c87724cd1d0a6033c5cbaa 0xefb49fce1c3287d1ee0a38eccf540a641b1f3661 0x1548c746b0a7aeeece96808fade6f703304329f5 0xc3a5812227a471d3b9aeda8b5cfabd08161d7eb8 0xcac639d17193b6ebfe8dd23b07a0c0e7bcf167b8 0xd68218ef4e4eb0095dfdb3215bf1bfe0aaa799f2 0x3798c465efa3b2b8eff582d2d20ece040e897aa7 0x0cd2054402ea9ff641187225e72360e1967beb13 0x3f79c228ff97b0491d9d8cbda071df4a80338430 0xfdd5ffbe65f2720538953331447a4669cf8a7160 0x2626b8523ff8041546b7a2b8ca00449536149a0a 0xfe9d6e40e96a9d93e2a60b776821041a3f668a89 0x2ec1ea037394c8f8c042a8ce49c98c56257ddb59 0x3daaa297c7aca9df5a112cdd7d5bbc8b41d9d81b 0xe058f59581e19a9de473a28fddca71ac1e6c5442 0x20ea861b3acec90d3a15b4755d9a1cf1f161496e 0x2e2fbff4440e77888da4f0cc7f5677a2e99d6faf 0xdabe0aae5dc98068963a49c63ff56144db6fbbe8
