ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-40782C1295BD
|
Infrastructure Scan
ADDRESS: 0x0d4a7679656f619f363344407fcea2d92ccab88b
DEPLOYED: 2026-04-29 03:30:11
LAST_TX: 2026-04-30 04:38:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Searching for ‚DELEGATECALL‘ and ‚SELFDESTRUCT‘ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0x9977. [VULN] Detecting ‚Front-running‘ risks in mempool. [SIM] Mocking MSG.SENDER as 0x562d13aca82df74f1e39527e28a01fc6c17e6733. [TRACE] Return data: 0x387b356e… [VALID] Data integrity: SHA256 verified. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1f85e9f97c63354e1d79f887c97dc344d138a0b3 0x80a2c7927fab340f4d20c76f3ef1265a8e92eef8 0xe9d1bed85e824966a0361e7c7617b83369ef4813 0x14e261c0e1a09a6ad70ea233c34899507f090e53 0xf1c4a0b153ff3f521b3b543084cca5ea82992a52 0x17b6e5a23aea5830878cdcfcdaeb9fa4e932a7c1 0xbf2608332fa75ea7d740354f8c35674e05702097 0xbdd2929b0d9e54be865861ba4d6a46ab05255b25 0x5e2bc45b152fd3f14610ed0c767dd5e726be1996 0x81b1b5d63614a3508251bafe79281ef72028df56 0xea12f3f15c65f170c8f6e571dd1a9c0d50f33c6d 0xc58c01917811854f400613928b02c147069c6f6d 0x8dd9251be95cb687e6989299a259846c60db0747 0xf92d76f3e1d2c50324ea38b4032d7cabf0856320 0x87e3672df8efb4b9a6d08c2505c11e8d4d8819b3 0xa0204c40ab299a26fc7d73a793f36f5fc2ca4fe7 0x1d339c2adca3fccd84458a507bad95104b3ecb2e 0xa6082520589fa2b772a024427a4bca9920ebe6b2 0x7d92332c168fe5631fb1ccb1390aa09c661e61ec 0x82dbe407b55927564acd31d4295a867731ed862e
