ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6C9BAA037C8E
|
Infrastructure Scan
ADDRESS: 0x1a66f9c2ded2b8bcfb39c73dba873248b688645a
DEPLOYED: 2026-04-28 18:13:47
LAST_TX: 2026-04-30 00:38:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Received 75 segments of contract data. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Garbage collector: 0.52ms since last run. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Fuzzing input data for 50 iterations. [TRACE] Call sequence: 8237 -> 5325 -> f6ac. [VALID] Finalizing audit report for 0x1a66f9c2ded2b8bcfb39c73dba873248b688645a. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x097447d6e4d241da56b0f06c07ea606f81af8dd9 0x1f10e9eb452fc36fae4352836d8b36fe3739be8b 0xbf961320ae1b53806139306b8b7f83cb9b6c06a3 0xbdb7158024ee62d0de327ee78005997f35848090 0x2207502a398b9e5e86585129f591c7e65552482e 0xf40ae5be07d94815a338627a6f643a358f0eec11 0x46e258ad131c7abcb36b2db38df4be47a318cd7b 0xc1bb6a2e0bba594bd67e23c55ca57fbd3394cf69 0x66989f3ce2195f9210d17e118c0d20b26ebef017 0x3cebb76ce947d571391a5227ce0bf029408f1482 0x84f94a4720cd2dc2c1fa9800182f521539f269a1 0x9ade17d83b34b2ae891dbc68d2879a239e3a6289 0x3db69d1e8372236fa7c7dd3a906feab33e2aff29 0xbb7dd311f47b084377c26e61d8dc6d58bd57015b 0x86b90192d11bf3eb943f38d4392983688e3b22f2 0x8d96b1fea2f0b081ef6ebcd9be3ca4f1d89e166f 0x9a91afeae8452c1bd035f4fb8b6cc96772864a63 0xb654413acda385192c83421afab538cb6c6ae6e7 0x0fa8caae0ddb773dee1d4bf6ae6c51f7b103106b 0xcec3b470bb07dd4c505a1821caf69e39bf50414f