ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D51F62EC2BEE
|
Infrastructure Scan
ADDRESS: 0x9f87e49b2b62e123f639d017894b82e4e4a83ade
DEPLOYED: 2026-05-12 06:30:59
LAST_TX: 2026-05-12 10:55:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Latency: 70ms. Protocol: JSON-RPC 2.0. [FETCH] Entry point found at offset 0x910e. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Garbage collector: 0.46ms since last run. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Simulation completed. No state corruption detected. [TRACE] Bytecode segment 0xe7 analysed. [VALID] Comparing result with Triada-Security-Standard. [DONE] Scan task 3F47DE41 finished in 27s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x607f752ac42c452ee2e967c547d568d4a21cc924 0x51304d8e8525fa78416003b6a44a16dab6ac07e3 0x4b9e614e61c727d549ca482634b251f5c64e92df 0x5ecf2d67e3723e4bd31b607373628d1748b81937 0x523eab27ce3ad6e4129a1f54de538fb3dabf7fb2 0x45ab96269c59e9521b52bd50a0b3dddeaba12f9e 0x90a7a6f362a61b4e5876561587ba50de3dae46ce 0x3314518bb017bfe775f8af5dacd566875065fd2a 0x95eb7f69a13bb02c0998c89b44387407fe3c8fcc 0x3175d0f9977d422032283b8f9eeea3a745f8ac89 0xb79cc5645056762890f47b477f34690b93d57416 0x692384fa5afc8d3b2635bfe2d505432ead2020a0 0xbe9780052f85e04635f7aa2ce51379edae8597a2 0x0a501f990bc071cc1d9fa92dd5fafdc20a0c18cf 0xf9245b9101677fa2a9208049ee8b8db1d293aa5a 0xf334e0e66c66d36ad970014d165686695b2ecb55 0xbabd3e221233f1fb657fef3d05f1002b649c02e0 0xa5788eb7858e164cdfa2e77fe399539151d2a6b3 0x1d74f13733bc75d935298c0e5073586b2e857396 0x31092197872a107069c88e8460eff219b047e423
