ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B40259FE5BF0
|
Infrastructure Scan
ADDRESS: 0xcc127236c75188aab28680e3260be026968301fd
DEPLOYED: 2026-04-19 08:16:11
LAST_TX: 2026-04-25 16:41:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Connection established. Peer count: 21. [FETCH] Entry point found at offset 0xcac6. [SCAN] Identifying function signatures (0xf6046e45). [MEM] Gas profile: Opcode ‚SSTORE‘ cost analysis started. [VULN] Detecting ‚Front-running‘ risks in mempool. [SIM] Mocking MSG.SENDER as 0x36805228ead6977bbb75851630810e10acc6a206. [TRACE] Call sequence: ab02 -> 4163 -> 1292. [VALID] Security status: DEEP_CORE scan finished. [DONE] Scan task 2F12E4D7 finished in 65s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa73c653f69c469a2216b1901ab8b823e0fad2e86 0xf4ef1f0827affe8276d2fc98dc2208be7e8aab97 0x2e4ac3d9d6df16f0e61fac0293f18fc4c241ad56 0xc415b16e982b537c6fa61854b26b666447c2efa5 0x7d096ec49252893cc7754ae3cdee62ba019fc9f6 0xca30cd52f1f49eb88392d5734f007aface13e312 0x82b353d3e225ec81a64a0b29e6a0eed257f122e0 0x6e156d84f91ea0a5b53a3ab9635cdbfe418cce98 0x8cb63bb97fda239b2afcff9ce3d82ec23f66e820 0x7810e0c67132ecda2584e86428155979773224c0 0x26178d3143182e9d652fec3d24642ca7d7610f97 0x2e3ea7104772954ad387d7fd16b7d9a0b69eea29 0xc0c769fcf6a5b043a35f93a591dc2e8158fc9cf2 0x0a178e7f61323e83a20e94ae0f5c18d72242c3fe 0xf5c052f2d60c63004621291944e37a733198c65b 0x5a999e11a6959dbaafab93d2f64cd82497891681 0xb36a871f0a7aa49529d717e677e09b7886de6c98 0x2367d6389a99fc366fb552046e6a2912ed3ccf68 0x2bfd70a537b587f17f5e5bda46b4f04d04c7b2e8 0xfb2dbdbadfc38654c0c9c571ce5b93b90ee84c1b
