ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-235E6419CF7F
|
Infrastructure Scan
ADDRESS: 0xa9cfa950addc707b86739a82849f6f77bdf9de55
DEPLOYED: 2026-04-27 16:19:47
LAST_TX: 2026-04-29 13:23:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Debug_Mode_Persistence
VISIBILITY: INSECURE_DEBUG_CONFIG
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Snapshotting EVM state before execution… [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Reverting transaction at PC: 1579… [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] No critical memory leaks during simulation. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x18dcc77c00dedf3effdbfd31499f713939a74e48 0x249dedfbf5a4a296e0ee834f303e817ed3c12378 0x9493dbbaafcd881a3d90b141a959ca637e316291 0x28a76cdcba5f90c7daac8f79be4a41b537b34908 0x8df1c3e25543ec9e471391f7030bde854170546c 0x2f55f23aed54d4eebcc0823d0883d537e02c87bc 0x918df18bcc906b21e148b3194bddf75932dcba4e 0xaaefdd78c96dd71292b44aba48b99400e82b3168 0xcaf90198b0a95852033e49d2b935dd6c49feeda0 0x45e9256c15eb759a42ec1fa013070b05d87be56d 0x97fb4873238bb13ee44dae12a8a8547d49b2fe1b 0x404b7b458da55e38d790b1596e77f9d547273205 0xfaf1827f77e606602b75b9f2b67f4a10a666f436 0xc557a8d8a19675aebdd1d0b4d7e373216ab117bd 0xda7d80f88c30704a3f10356c298b80ba14e869e2 0x8dd9251be95cb687e6989299a259846c60db0747 0xa5e3616a78c989565dbca530e49774421172b31c 0xe6cc1e491a167ed591065b53433093806dd50f54 0x8852d642ed33e757b66ebe0b1f30413c650adb45 0xe1ff773660c1a04732b3916debd7dcbe4c99e5cf