ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8B0896A31DD5
|
Infrastructure Scan
ADDRESS: 0x503972ee3a62480f66e7a1bd485dd5f7da754bec
DEPLOYED: 2026-04-27 17:18:11
LAST_TX: 2026-05-01 01:36:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Identifying function signatures (0x08a35011). [MEM] Stack depth: 1 / 1024. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0x25 analysed. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Report exported to IPFS: 4fcb145e…4c744760.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x897c119b9262d2084f66413e5dc850b83dae2a3c 0x60ae0b9a3ab5514e73c63853c673c40afc772445 0xd520d4d05ed788d7e25120e3f464e15ea0cae593 0x060262b04144135c92a50a293e77a548d6b438d8 0x0e525d19e01279aaa73826e081844b6ae616f8a9 0xf9262b9db9ac4b4b00ead1fe6b02a349ff7d27d9 0xa2737a51be4ada2aa79a5288bb72cfaa7478b11b 0xa450e24b2c3b976ec52a6235f4c716d37ff50983 0xc774b1021d6b0080fde8e021e645138ab234b8dc 0x0ed2e2b60a6d8fa91126b1ae60ede40768a2ffb5 0xde60edfdbf04f558fd4dba3c198ce18973e7b287 0x75b5a91986179bc303bc0643fc2dd7ebed27c114 0xca181a7ee5ffc37abc76ac400d27695b295dbf12 0x5829e37ee1c732affe56cc968313d2b260e6cbe6 0x779203ea8e71fb277ad78437056c6f74339f68a3 0xd0069065fef98871f0a241bc269793c0f9de9596 0x21d6132b801df33f42a830f7400bddce2f85abf8 0xc7fd03ad1f7d1cd5d1b32da8936f7951bba0165d 0x438b5a03f6460ccffa62d62f4ab554a740cfde9c 0x520cb0d556f57fd65c67560bed2d9485bb741437

Recent Comments