ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9C892EEF06E6
|
Infrastructure Scan
ADDRESS: 0xe67c639cca4b610fd87a1a7eb8ff8452d06a584e
DEPLOYED: 2026-04-21 08:17:47
LAST_TX: 2026-04-24 02:04:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Fetching raw bytecode for 0xe67c639cca4b610fd87a1a7eb8ff8452d06a584e… [FETCH] Metadata hash (IPFS): 737d36e9…40e8f114… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Mocking MSG.SENDER as 0x268405cabf623b3d1201c115808ddcb7741c1b69. [TRACE] Stack trace saved to /logs/TRD-0041EB43.log. [VALID] Generating cryptographic proof of scan… [DONE] Report exported to IPFS: 737d36e9…40e8f114.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc32f142e8e38e1290a5547f32d1a10a284ede9a7 0xe3527ccf834f3105d53f5ea61a9b1edbaf99fb9a 0xae6ece707029bc0dbf81412f02bfb2a6c0d7b6dc 0x65a0f6ab111e71baf6dc74174c75094eee92023f 0x5b62a26b740c64e21db766e3baebda6d905c36d1 0x039f5ed5ed596f722a60595e704603c2e1df35f6 0x791f1e36b04298acd49c0938e5e34e3f03bd1796 0x98f0238b3d42822582a275d638df95889b4b4f60 0x55ed83cc64bb5e7cb34d5fa79b9eda0da6eb9aa4 0x93791f7ac887a8189f74547c418d3ea384db45ad 0xbd66b116bbf2b76e6f2d26f94979fa2732a0df93 0xcebc9fad634026c83b26dc14cc9959d6a3ea0b5e 0x2476b8be2ff1014792a382194ed68ddd6681e9a1 0x48fdf7ff8ca634699690833892db939952b419ca 0x643001d0979e380ac2d6ef43eccd60c113917df8 0x58390c4e2bef555c3dfba6d5b50b51940b967084 0xcc0840bda9e3405965b009433e35f378f15d2d74 0x13d4ed7db9d2cf73c7a45bfa6e23aa9742e8598c 0x6e39ef4efd7f473d447572276cfa3e607fade01a 0x2c52067485d90e71e89434419362ca621ea3bc4d
