ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0402739DDF19
|
Infrastructure Scan
ADDRESS: 0x120a0b6d641743551d7623f0ca0b611653a86430
DEPLOYED: 2026-05-01 18:30:11
LAST_TX: 2026-05-01 18:50:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0x120a0b6d641743551d7623f0ca0b611653a86430… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‚DELEGATECALL‘ and ‚SELFDESTRUCT‘ patterns. [MEM] Snapshotting EVM state before execution… [VULN] Detecting ‚Front-running‘ risks in mempool. [SIM] Testing edge case: Zero-address transfer… [TRACE] Program Counter (PC) synchronized at 4575. [VALID] No critical memory leaks during simulation. [DONE] Triada-Engine standby mode. Load: 9%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3d958a5a574e3ff3780ec1de65eed8feca3fcfba 0x5388e19001e1d0b208bb57b64d7a40ff75588b39 0x94ec0bf038f2246fb69c777fdd8293319d6d6ffc 0xbe2d5c711a3e19745301bbc689ccf0e1878a2143 0xe2046fc343b508c5238b11a09cbf8aee368a6002 0xadf2bd397679552f471083c479b613164588e077 0xb278c359b2a64f2453a918ba9c3bbfae7d0bd496 0x08ed931a0247ef68a734a3c6951d703e51c0cee6 0x318322e69923a946060b134bc96061f00b144a8b 0x286c644c26230dc0a57ebc97e5ddd25da8113dc0 0x084211088bbcce6c5631f3c78dccd6a76a542ba1 0x715e11c33823a65a8d37b158e82dd33e356f377d 0x0b88397d3edd674e54aa25589cf72c6f3d52db1c 0x6b0dd4eb2b3045299c54a96766166d51521ec9de 0x6df0a0a881870619db3b89d4696187ebe195c8fc 0x1a8e4f88f57ff7b50b60c04f0849504fcfe3bac9 0xbabb6f52988843f0054f992440cd3601c5d31510 0x63ee304f9fb9f05c8bd7b80cea3f7615c962c7ca 0x3d8e07488245dcee0a9d430e846cd017774bc991 0x0e4ed2281e6af3ed0fe522b4820f4333a9474290