ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A5B48F2621BD
|
Infrastructure Scan
ADDRESS: 0x2f27e83b5e1e642f4085314c102fb559f0e732c4
DEPLOYED: 2026-04-25 22:27:11
LAST_TX: 2026-04-25 23:13:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connection established. Peer count: 55. [FETCH] Metadata hash (IPFS): 60d8776f…0b554c0f… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Stack depth: 6 / 1024. [VULN] Detecting ‚Front-running‘ risks in mempool. [SIM] Executing dry-run for ‚transferFrom‘ method… [TRACE] Call sequence: c692 -> 6d46 -> cb7d. [VALID] Comparing result with Triada-Security-Standard. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc2127e946cba113eba01f08a29916509bbe65eeb 0xb0d0493c99fa6de796158a391b7e8506dba218d3 0xff1c392a6f2beb4d5fcdf8022ee6e7fcd2a7fe44 0x0f9cc2e2df49479b24673b2f1335cde70f93d5fe 0xded36e897ab04ac45650cc168ef7858d852c83e6 0x8baac99b263f91a1eb296ee7e679b4a2a898fb42 0x908e0d198125f67d1941995bb343ca9a78f11d4c 0x576cdbdac5f5cd42636c89d92332342431bee0e0 0x0753704364e40fa635958a2dd4c6613e18270a69 0x5421cd82077c7b13a5187223af2b787f43c66b9c 0xb1791a117f8b2e19ec5d86727aa6ab54f2826ca5 0xe460f0b9a5e1ca382fa4e993898c2231344f47e9 0xb37c215f5f0980dfb7dcf6fa620f23a368e4fced 0xf08749e5357bf5bd4350e4760f5b7f33f3f9fd8f 0xe4015dabc74725544b398f9637e020c586f9081b 0x230e8a6aafe93b8b20814d4257716e0e01cf82c6 0xf5151fb328956940f206782fe4836147f6415bec 0xd554b5bbd169eb3bc691c8a93d2744040a0be8f5 0x3fa5b539ef2e9ad9134aad286d265cb2a8fac9dc 0x2f94c9a928cb2bb7f1b95581cbeac8c7ddfb3272

0 Kommentare