ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8E50475019E9
|
Infrastructure Scan
ADDRESS: 0xa8adb16e6af5eeeb0aa6ac5fb638cb610de80c7a
DEPLOYED: 2026-04-28 06:55:35
LAST_TX: 2026-04-29 03:24:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Fetching raw bytecode for 0xa8adb16e6af5eeeb0aa6ac5fb638cb610de80c7a… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Identifying function signatures (0x0b20408e). [MEM] Virtual memory mapped: 0x0000 -> 0xd1cd. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Mocking MSG.SENDER as 0xfae2d7adef372173d0af5aab88ebe393e4a36187. [TRACE] Stack trace saved to /logs/TRD-32FBA887.log. [VALID] Consensus reached on node cluster: 4/10. [DONE] Triada-Engine standby mode. Load: 9%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6d63a7ab825cd34d8097edb2ee354c58821dc02b 0x6b26c52345d70e2fbda9ec76e12e970c6996c432 0x2bfd70a537b587f17f5e5bda46b4f04d04c7b2e8 0xcc8a6736cfc546e78ddc866ec5b4074b8c917276 0xdb1f3bf45e3d6f4aa88c25432b2cd407963f952e 0x7657f07ef98fe9010ebf4940feff94bd99c68b3a 0xab29bf0d54650dd1977f389633214fe2ecca9102 0xfe3daadc1d827fbbc6c2679139efa8f7a7ecf45a 0x11a16aa3bf2f9d4a1311a1c1fad81326e59fe23a 0x5ae8f1b6abaa4de2a0f6c6f5379a489c9491b3eb 0xa304bade65fa93ef960c853f64c9d6053236d9c6 0x253477f40e37d933c8887ffb18e27934f480e9d3 0x31d270cc71349bcdc13b534d92c1f8aae6de07df 0x53533eb304a14ded30327d68e24a75d14697d37f 0x638b2e6c64ec87e46e65e9aac669e223a003cf8b 0x099a318a9f49ec6e25cb7c5a7d49561c95d81cd6 0x8f6ac296b9da70d2e9cd2747a7ed8d3b383884f0 0xd5ccd7d47f293d3dd0ba50c582bf4ff86acdf862 0xf53a934560ab800bb15b9dd432ad882a45bb33dc 0x910ecd22c29c03ac81bd02364fb05782458fa17c