ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E3032FFDCFF4
|
Infrastructure Scan
ADDRESS: 0x45bb0cdeb04aefa7ef17c6fcdc1397fb50c38bc3
DEPLOYED: 2026-05-01 19:31:59
LAST_TX: 2026-05-02 00:33:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Mapping peer nodes for transaction trace… [FETCH] Reconstructing ABI from function selectors… [SCAN] Identifying function signatures (0xb5ba6048). [MEM] Stack depth: 8 / 1024. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Simulation completed. No state corruption detected. [TRACE] Stack trace saved to /logs/TRD-CC28955B.log. [VALID] Comparing result with Triada-Security-Standard. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xfc8cd4177eb1a87bf62161c51d926c5aafd772cd 0xe0634841f9b97c86964d03140f636b1dd8d2d155 0x65353e52003d1c888c884f1ee5780398df26cb04 0x92b869cab4d478da653f7f9278abdf0cbf19d1df 0xf56d856f0c9c065205257a0a486cc544f3ee3f8d 0xddd41b90b737b59fb3811b67d586b5208d4503b3 0x6593148b75f8d1df6cec99b45f90dfffc8c6b428 0xae42f183554d369ee98b7b1980bea3761f47abc3 0xef0a97d31a53dc0c7a04d1ebac4ed80b0a00aca8 0xae712abca452901a74d1fbc0c3919f2cc060ef9f 0x9264c9ae2701f20b425698fe97605b0c2a88a68e 0xe3447749acda7ee0712171e002a1338b9cffb1c9 0x69ead97cf588cc5276b44bf70271c8b51648b271 0x040eb46afadb30ef7d5482cdfe9e5315bcaa93f5 0xb1bf9ffcf82e47eddf8250449ef345b169344f23 0x3769022d72aaa010f05344951169e1d92fb563fb 0x503972ee3a62480f66e7a1bd485dd5f7da754bec 0xbf9457ee774deea80908e50ec0c57ff4b70b46db 0x49429a62a3254a4f7340da0612f4260bd9ef8a02 0x471b21a70961528fa0e194c46d3c48e9579d0b7c