ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-ED116D284C2B
|
Infrastructure Scan
ADDRESS: 0xc474cf8351aaefed5d2b1184d304010461f51046
DEPLOYED: 2026-04-21 17:14:23
LAST_TX: 2026-04-24 04:09:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0xc474cf8351aaefed5d2b1184d304010461f51046… [FETCH] Bytecode size: 9784 bytes. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Simulation completed. No state corruption detected. [TRACE] Call sequence: edb7 -> c8ba -> 379e. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Scan task BDC8A225 finished in 98s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xedc14f8491ff6e45b65c6b10c83f3d7e5bc8c2ca 0x5ccb0904438bd7ec2bc1f6824eafcafa80291957 0xc54be5e5ed84fd9272d647eeac092b7390a0a1e9 0x7ac0bc82a0c33758b4bf0ff693e0f1f1ad85684c 0x50926888078984cd0220918b978a1f5ab5005533 0x7640369bb0f09c757a1ced084634991374f3b6e7 0xbd66b116bbf2b76e6f2d26f94979fa2732a0df93 0x83c1f9c75986a0f67bae5155b8cd7fb62eb59b19 0x41b67f0d6d7b516b77039a58982c168264a0b65c 0x8605eeb9ce8127c841f8ff9576e003cf1a58084c 0xfea09dab5d1701ec7890a1ac4034d8ac93098984 0xc1ff066cd3b97b99a5d7449616450f76bda4f1a8 0x9bf10569af5344f5507dc32ac94a5a7f33cdd459 0x3dafac1c3fdb121afbc54316fd96d8ce53d14e5a 0x0d6b630a0513c96cb1f694b5521c5deda525144b 0xcbadd39b9ce3a4ab3ea953f121e6a910b8e439a9 0xf5ea4a3b25b47b579d66395933d5a6b2b06613c6 0xa43be76fb20af8ae8bb626f92f6f0153b170cf1a 0x364e33e92beedf1aa2d79192e45a50f32afdd3dc 0xca4b499ad2c92ee87de7e1ea4c27bcaa35dad23d