ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0A276D0C74E3
|
Infrastructure Scan
ADDRESS: 0x2b17de3a8f26f6a80b3b82617a81da92aea2c6ef
DEPLOYED: 2026-04-25 10:22:35
LAST_TX: 2026-05-01 02:15:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Synchronizing with block height 49642. [FETCH] Received 55 segments of contract data. [SCAN] Running static analysis on JUMP instructions… [MEM] Tracking pointer 0x9ca9c9de in memory heap. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Simulation completed. No state corruption detected. [TRACE] Call sequence: d5d3 -> c217 -> 19cc. [VALID] Consensus reached on node cluster: 3/10. [DONE] Triada-Engine standby mode. Load: 9%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7442f7d43d56bcca0f10ff3c5dc5b7c3de7063d3 0x7dcd1466f09b699ed73d743ffc0520cde1cc2ddb 0xc4053119ac3fb2c4956ed174fe4a5148e6f9cea2 0xbbffdae9a78eea3d81e050d71efe1b5590ca9a8f 0x812c612470f8f06f437ecd977388a403a0cfc6b3 0x5f4e972823785a355d2cca9422207856eff8aa6f 0x2bb652b76e448d1d94b110f6eb046464a1b347ef 0x52d718a68b4f385da5c67be94d42851777f22e85 0x3a32cd1670afec69505b4fa075412a03dc253e03 0x8bf58109c41b508df35ab31a3b780dfcda747460 0x439d4f10dc13f57ba402ad72e7813625b6b0b3f1 0x5525eb3dc69f08a16b0f6e70f801cf302abd419e 0xa85feffa7c3f403df934baf632b33b41d83572da 0xbeed9c9d9d782f978030a2a34e4b3e3b8dbb02c1 0x4e1be9ad80904ae3f1c3905adb5edc8bc65aeb8a 0x825a55d7d13aaf24e5a34f6d21f264c5d69b520b 0x5306ebefb66029dbfbe4b0409b69dd334a3f7dd8 0xb17b26c16ed78c9045600198e3bffad72339dae5 0xea1c8916f1a9f04f02f0c678916374d4a2eddd7f 0x76752e33050f2011cacd3edbbb8125ee1e49c140
