ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-01B20DF44750
|
Infrastructure Scan
ADDRESS: 0x07e0ee0440a4577ac69dc7d8b3fc168ba327345c
DEPLOYED: 2026-05-12 00:41:47
LAST_TX: 2026-05-12 01:05:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Latency: 43ms. Protocol: JSON-RPC 2.0. [FETCH] Received 93 segments of contract data. [SCAN] Identifying function signatures (0x9a7a02f0). [MEM] Clearing temporary registers for deep-trace… [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Reverting transaction at PC: 4748… [TRACE] Bytecode segment 0xb0 analysed. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Triada-Engine standby mode. Load: 6%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xac8d314d556f3ca55de54223de3674ca3023bccb 0x7b2794ef1064b102e2966769a160705c17af33df 0x46423f6f40acbd35da150f52b08ed7132a5168df 0x1d35754430e99d0721489a6e4c1070bee4883e24 0x872ec8d78095a722d76b6d1369192119559e12dd 0x6cb70df152b1e9e19ac7fdf7bb1251f58ab5408e 0x005d1e6380ae8f1b69922ef52b71a99c3fafe733 0x854a55152bf7f165b84b10a19546dadf2f2e72d1 0xc3414ba26b535fca11fe9ee1d7a177b68a7b8f41 0xf37006187916764dcd979565ddbba3038f7f76fd 0x0f09ac74ea9cd530a39860adff105ace31e0ef5b 0xecd33c7d6c11d3658f1ce0a7588ff571140c5795 0x1dbd7870c903f2c5676075ae2c9d49af6a3b0486 0x9c478bb25c54c7895f3884116967bb2a44de1c1a 0xe260a63b6c5a87d157c71ad3b07771ce94c8066c 0xd443be0e8755476d54b6db2742991975feb729b4 0x34f016eacb3ba45b5dc03e9b6f0ac0d8a0b87292 0x159db79b827a18c4fb9a0897dd8473f1e6be4d5e 0x55251ca2c00a9d017ba09b81a8a2687a030f5722 0xeb939ed3ff0e4d070ebc5895dccc1a68985dd677

Leave a Reply