ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6AE70C68AD49
|
Infrastructure Scan
ADDRESS: 0xcaface86f71cd3926836f7aad854b27167dfcbc7
DEPLOYED: 2026-05-06 07:15:35
LAST_TX: 2026-05-13 05:50:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Pulling contract state from Alchemy RPC… [FETCH] Metadata hash (IPFS): fa1b9ec1…f67ca4c6… [SCAN] Running static analysis on JUMP instructions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Program Counter (PC) synchronized at 4573. [VALID] No critical memory leaks during simulation. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc98acf0011168d9c0cc8c46eacea46fa7253e18d 0xa39321994208f64897dd05001da1c2ac60ebacb3 0xfc4872567334d27f074feef5517ecfa1ec5e644a 0x6528173f33d3078dcb920364a7e002c2d7cd889d 0xbf86f154a53ddade5e635d8d37a7509fa86b49c4 0x0c6a086d1533c03061cc9a24484c1673500dcd62 0x5e6ecd1e78b6b4fdfc553d9617a2ac8e18ab56b1 0x431682168c5bf635fa6aa9bcd30d8064489378fa 0x65f359cffdd764178f83417b66458bef74368843 0xe1c87f153d0cce936f7e71b40fa3b584ddf8e76d 0x2b3fa3b473ba0a65feb35fb1186a0077b191c78f 0x2775656d64033dd4d6adda53c5781c24d7c86164 0xe61370b0d721871c87332b5a55424ff54260ed4e 0x158d7cf5eecda95c1e1b9f11b85fae77b645bbbe 0x219e8039359c1ed650c7280ba87251e282288f7f 0x37dd56de6f354d53241608d1e691ea97c7801019 0x143aea0b3f20b98d5ab2883647b90d932e35d1a7 0xba73b37d376daffd972050baca9d47f41bf4bb3b 0xfd6fa12eab174f7b082a438130c49b190eb4410e 0xd54852c4a23fceb71ff910ef44f4764be1d6cdc7