ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-15E23B7E4ACB
|
Infrastructure Scan
ADDRESS: 0x7ef8e681baf4675424794633de9176a60c347607
DEPLOYED: 2026-05-14 11:36:11
LAST_TX: 2026-05-14 12:49:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Identifying function signatures (0xf6d2775a). [MEM] Simulation buffer: 1024 KB allocated. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Balance check: 6.20 ETH. [TRACE] Execution path: 76% coverage. [VALID] Finalizing audit report for 0x7ef8e681baf4675424794633de9176a60c347607. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2e11bdc9b9bbf8f8cc8c4ccc581df8e8020deea6 0xee1fd70b51f602f200a53101a9a77104c6c74d02 0x5e6ecd1e78b6b4fdfc553d9617a2ac8e18ab56b1 0x9c413796728d7745d2418ff1291f92cd1af74fa1 0x0deab4ea8fb5b4374696f6a5c72a3250276546c1 0x535ef3f6635ff7fea4fc70f8059bf24c79dfa1bf 0x81d678de2869cdbd4c441a759fdd9e5976b938ac 0x8c9f95e9a91567cfa81febbded38499d8c9331cc 0x00ddbb2c8a2c115093f56da718027b32a4896952 0xd163dc133eb5926ed5f726ff1911c717d5ec5f76 0xe7c768b6a901da759b367c05bde6aeb9aa51ef2b 0x8985e76eaabcd0f8e102208dc0880bf68a1cbb12 0x497859814916187584ea5efc26d85410d52acf63 0xff97eddcfcbfb0a1fd8146037db769e67d25d8ca 0x454c1f9b46a5c7b9f47f81b78c95775329c6299d 0x6ec4be6b02bf6c881697de0e01ac191c0bce2623 0x0c7af4974c517483978b2ef6a652c9769201b005 0xa94f7bbf4f712e37b7f7616c265667aaeda98aba 0x9e9ca31f03ae620fbfed9b8f325aa57154aa5cf5 0xbb53dddf9c9472951cb0b06c2d72772b06bbe899








