ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-260E6BC51C57
|
Infrastructure Scan
ADDRESS: 0x6e75f8ec939987ea0e9e3ec624cab6717832795d
DEPLOYED: 2026-05-14 23:10:35
LAST_TX: 2026-05-15 07:14:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 504D803B. [NET] Fetching raw bytecode for 0x6e75f8ec939987ea0e9e3ec624cab6717832795d… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Allocating stack frame for EVM simulation… [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Testing edge case: Zero-address transfer… [TRACE] Bytecode segment 0xc0 analysed. [VALID] Signature verification: 0xc9857efc67cc4ebb8b91db1120c01d02213b2296128d4c68ad2af4e91ce37575. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9c9f508b7377a0efea393cc6e3d1cb84a9b159d2 0xee5a51da66559a7ce924aef86d377ca8a751143b 0xb3cd6befa02f1a6c890dcda1371793e5cfbf622e 0x760ad5fbf9f31fa774b38fd861c0f294c361abc2 0xff966cfe77583b36c44198ae8819a2233221d82d 0xa40a60dc0c9548c19d4fc111e8b54d1f3abdb2c0 0xee62287b6a3fb72881098b5864d2e0393260a21a 0xa1ccd1bcf1a88e527d25728ea519adce491ec883 0xd28b60720cd9dd6d22dde51feb0b248b52940a9a 0x20476e2dd9e0fc55ca08ef1fe2030292c1660343 0xef5027b2b6a53b9c12d83d6a60a7accadaf7aa23 0x42110a1082599176732bb3898b5bd8ff18d3e2c7 0x6cd1610c3224851c93088e5d4d1fc26eea8b715a 0x1ef2665363fc7adc6f7d829a39e3d4544b2e9e0f 0x5681927f3f7783a10f4368ddcb32ba2fc4267497 0x518d90e56f12df909568a4a55700884e8528258a 0xdceab3a7d896929f74e595b4cd4514ec787c7ccf 0x1465a89c54010ec0546553357f352a69615ff707 0x96d0f44297ad0d21e1aa3e6c24d6554b0afd8618 0xdbcb016d9d23a1805924b4c9d96281f86e69021d