ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-95653D034DF3
|
Infrastructure Scan
ADDRESS: 0xcf24e99e8706ff84f90e92e73ad644a1e17beb45
DEPLOYED: 2026-05-01 05:33:47
LAST_TX: 2026-05-01 20:52:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Synchronizing with block height 75312. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Allocating stack frame for EVM simulation… [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Mocking MSG.SENDER as 0x2bb8db4324a335af6bac637594a5efc8d35a6874. [TRACE] Execution path: 14% coverage. [VALID] Signature verification: 0xd017afc6b58bd404730639139309f01b82d850b77c29264990fa45765871d162. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd3e6c3a0ca9a52534c64cee1d03b61f11dde33ec 0x2b830fdf5c1ba98197b20c1b1757399db1d99873 0x97289a5e79b76f71fabaf4b8dd47e9e601a3064c 0x49dd3430244654d2fbac34c455733214920d759e 0xd1b9516b7d62af22cc6c9ad792f99004160a3810 0x79993ccdd689e8388bd0e2a22d486f417c4ebbfc 0x4249b9aace1a4547f483f88f74e04d950b7bfa91 0x547aa906b1c0cc5ecc8d1df68db685923e47913f 0xb4635b74dc2d7fab3af1f40073d43e636f51bc7a 0xcaa1231ce580ef2a8090133c158c652b4df7989a 0xf655307e4a4642bedbe8c92d47d7274b94a58eec 0xe4569f3cfc297ec6ce27654d3d41b138c6e22f15 0xfd1c118323d1af79204f24635a428458e19a5518 0x12f689515acce7306bf8f53300d2f9d0f42456e4 0xef5013da77d58a202d1fe423af694da1ba07c3be 0xca2f5e927d9b6d610592e9c9d1d4348174f83d24 0xfd4c18925ab166f0922a9006fce4fcfb61ae30d9 0x548af12359c1c13dbd00a90331ce742370590d71 0xf41c5683680f9da33050577ec5c45a7d5f2f9be5 0x3cb03c96e9cb3c416f8e9f60c0a5677424720b58
Categories: Uncategorized