ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-09E8C315FB58
|
Infrastructure Scan
ADDRESS: 0x685039b67e58d2f1441d03bbd8b96a7264705566
DEPLOYED: 2026-04-24 05:05:47
LAST_TX: 2026-04-29 17:59:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-5. [NET] Fetching raw bytecode for 0x685039b67e58d2f1441d03bbd8b96a7264705566… [FETCH] Received 78 segments of contract data. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 6 / 1024. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0xb5 analysed. [VALID] Security status: DEEP_CORE scan finished. [DONE] Log signature: 2225ec0cd524d84aeaa142a48d6a85e9b763222e2b07ff68ccd84e3ab39da77d.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x92ad1b115762ff1bc38accbd7209ca0449b06d1f 0x12ee073125a512d554c1c768da9abadcd9370034 0x60118c33593295a311c55541fa9e98ef27ded4e2 0x77897c7eaefe1342dc2bccd05dc85241d9374517 0x854b7998f0675a565f78ca441b19eb59256f839f 0xdaf9112962a05453f2e3f03e94cd361c689f4426 0x6891f4231763ceef8507156d8b2dfec6cfc9b1de 0xca1f6f8f01e8e6d078c4258f41063d6cfa7d4c9b 0xcd04bbb4e541a4a4faab5619c3c34d2f34022ef1 0xf9560f5f075f0aab3272604ac30ebfae2389221e 0xcb150be58ad91a0648c057729dc7f678670cb965 0x0590af733eaf7f3f696ea8cc4578e617ab14e02c 0x54de06a7779be67fe2177ff7afae3e4b70a54d9f 0xd0006e22149a916d604c8537e0328a78020707ad 0xf3a4cce5a4ff4c58f752740b49b8c66fba310c7a 0x0374a573264b604af8cff4e45f441b73a0a68f2b 0x50560a26c5c899403d7615c0fd75381e271ca13a 0x218b13081c8709123fb367de76975bc01f33d57f 0x1bc6da0f269419b7ffba1f0547ea030851fecba3 0xfa037a0dd661b22da58d27c895690fff58a72ca2
