EXTERNAL BREACH WARNING: 0xe4f4aebae789412d2b62ed943043def626045cbf :: External Access Warning: Debugging Port Open
Door pragma
inUncategorized
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3AD88B6F7D4C
|
Infrastructure Scan
ADDRESS: 0xe4f4aebae789412d2b62ed943043def626045cbf
DEPLOYED: 2026-04-27 21:43:59
LAST_TX: 2026-04-28 18:50:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-3. [NET] Mapping peer nodes for transaction trace… [FETCH] Reconstructing ABI from function selectors… [SCAN] Analyzing visibility: 3 public, 4 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0x7241. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Balance check: 8.12 ETH. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Comparing result with Triada-Security-Standard. [DONE] Triada-Engine standby mode. Load: 1%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x842e846bfedcace42452c8dffe69b346f8a46111 0xb5f6e27c9646f6bea31031f16daa7f84ccfbe0a4 0x5352ac901f40c4b89beefd5582671213a2765a43 0x129f00b03bfa2b42dc39a4d2d36a83088a1ddb9a 0x8156a71dd5c869ff4130a43646f381b908d20488 0x4e644dff647da635364f8fdb81adca0286905492 0x060d11e3ef4659866b3e688511b5e1e8d338bd46 0x1051ed188bf63abb2c2bb92354f12da6deb821de 0x2d0ad2bf8a155bf8af63190a216a99322aeb6ca6 0xe7aa9eba834278992390136e97d9f5d69a1c68ae 0x9e06af8f1bae9865ac73946f6d66920197082174 0x89901d6727ccb0daa1402922b91b46dfb4bf775f 0x51136f8965638287d848d362de6a69761b307010 0xd8468686b44039f631df2232d2ae526a954e5043 0xa4b080b9b35c499a57ea894189ca37977fc3ade6 0xbbdd102682a08048d77cfe9503949ba42700f870 0xb83c11e807292718367f305ae585bf144d3d24fb 0xe9b94e79fb8cc29cc979d063d67ce7be87a30459 0xce1b4fad19edb0672cff84ec284b7c72d1bfc359 0x90c2003367399cd8fbe0c7d2d9a1f4a8217de426