ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-508ECA854B52
|
Infrastructure Scan
ADDRESS: 0xdf22ce0de1c93bae44efc948770f65352631c403
DEPLOYED: 2026-05-05 20:04:47
LAST_TX: 2026-05-05 21:27:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Pulling contract state from Alchemy RPC… [FETCH] Reconstructing ABI from function selectors… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Clearing temporary registers for deep-trace… [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Verifying ‘require’ statements integrity. [TRACE] Debug: df5eef1b756be20f. [VALID] Data integrity: SHA256 verified. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3e5bb2a724dbe9a6afe04ae7581639367693f51c 0xce02eb544532a5f6addd504fb4a46c1917507c81 0x4f7247feeb1cc56c2ac3b14b237c83ab0686f41f 0x5917a8960bc6a864ac5e8bb5062a3cd11c814973 0x719694ce8bd1ffa3167b2dd844cc68c567e02e63 0x169797c175d63932db4b62df9bcf88b3c9821d4e 0x64857605bad2865e68332ce5820453d7ca531e22 0x2b43fc4516ffdbe4716c8d674e1032c640f33508 0x911fd10759fa69fca7b2f90111d486a5c1803675 0x417d768670882bd978f6e61343a788134c83440c 0x03dcb1da5c101db58b8220c63ba690ee5f53cc4e 0x7296b9558290cbf9fc6a9a2ddbb0927d8017d08b 0xb73df80b8a67b8ab8b30de68677506931e287af8 0x83c6cd35192c53bf3261fd515a7919cb1f58d69e 0x8fb672088ae1d143a36c844a47ec167654b13a99 0xbfaf5604cb98cdaa7543d62e25666c67f82bff36 0x1125eed321a48ad48c4a8fbd8a6bad538bb85780 0xc4414494d53c6bd5b2e4e12e58508e2d24dbd0e7 0x46350f577aa5dd2f6ddadc2541afc54b2b755986 0x3fd2e820bc127f2dc7e1e319ea93871237e5d61b
