ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-72DF5265E1A5
|
Infrastructure Scan
ADDRESS: 0xb086c6d2fdd0ef2c87a96c699c9cb791808fbf01
DEPLOYED: 2026-05-11 07:26:47
LAST_TX: 2026-05-11 08:04:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0x79eacd65 successful. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Detecting compiler version: v0.8.36. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] State change detected in slot 0x53. [TRACE] Call sequence: dd75 -> 92fd -> ff8e. [VALID] Signature verification: 0xb6499d894cefae91a088056034c7f05f5b827c44684952180b41423668c52e0e. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x79e0a55c723ea46a6f0a8be2a760b149113c0c5c 0xb7034f35ad563a795ff705e0e68584c9ca09fce7 0xd1dfa2701944932b27cf1f1c8533246b5400943f 0xd275367597b3c20d0cda2875bdba1701f2507ef8 0x76e5eb399a483f65a6cb967a5920fb9f2b9a6fe6 0x2d7a36982ae9a58b40d27badba967b1c431708d6 0x83e54585aa15b44d7e72d740b0bd8881d190b1ca 0x9d97b4598a25e85467e3016418b98bfe7012962e 0xa7338ff46bce45f8c8b97bf8a99e1044dbc6699d 0x79f145ec07b209e782013ea5932c553b5f56ec3f 0x2fcbe9bd99f297926246f9d05ff8488cff6d1978 0x4d1540db62af5780732b938f661fcb3eeaa759f2 0x50d37e4591cbb18719bfa85e3756cbdd0bb8edaa 0x445229facce32c7de3795c863032c64cc8b79213 0x910fca0398dd632e2a4288b699d4486990e951a8 0xfe22b249d7132326146c8e6a86afcc98b278909f 0x1174f70d19a66cfa0749abfe9038077b8c56048f 0x30a4011339c99aaf9987714ce6ffa7621f9a61d7 0x7789e0170175bf9534beec08c38f960c5216e000 0xf852516daec5d29be4e2925104ab499369735741