ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-38F2EF3E1C87
|
Infrastructure Scan
ADDRESS: 0xc566833d5c05619250ff024b14577d187134a0e6
DEPLOYED: 2026-04-30 15:06:11
LAST_TX: 2026-05-01 03:02:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Reconstructing ABI from function selectors… [SCAN] Running static analysis on JUMP instructions… [MEM] Tracking pointer 0x0a057d06 in memory heap. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Balance check: 4.70 ETH. [TRACE] Call sequence: 4343 -> 812e -> 6dcd. [VALID] Finalizing audit report for 0xc566833d5c05619250ff024b14577d187134a0e6. [DONE] Scan task 44A6D617 finished in 35s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xce3235341530801cf510ee492db639ac2f7bc77f 0x3a2a6bc964aa76be3ec907468bb27a62c2072dcd 0x8eea6b672d02a3ed24134d95423fed6cafba3a5a 0x298e14d08a7139911bd7cb19d8e0fd91a11380c6 0xbf6b0d942efcfb8a3be3dbb20fa522808acbf1d6 0x8e5e717b1cdbcc772d5c98a62318450dd265a501 0x8f5db25b1c3123f5e817e7e860a8aaad17808860 0xbb8c34c6915309a51c20c1d7055b09887f960848 0xa1df7c89b107a223a6b4c513d3b5e2f85a13fb74 0x164f5df3898af566b9c5c60e2e783965b50121ec 0xbfad237cd9e3c0e243705786439bee6e13e53ffd 0x5f1bc3bfded546f286e83a2372c25228c6be580c 0x33583b38831606d1826fa2cf682f5a9acd22fa30 0xed11ef1ca37f12635fff6ad6163486f884a521ca 0x91ccb85bb6e33f347aa61030203434953cd214ae 0xba3a39062d12e245607c4579cfa2cb5e4c3b3da9 0xdea1b07ccb89f3cd8f5d055b9777cc802a4928e0 0x92188b7032575630574eb0284b5b57c4b5a32b41 0x3f3f08a414d96ae6443a7b9094409b90b9029952 0xdc1417ff6716cdff2bb13a997540adba788d3997