ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D8AEAF6737C1
|
Infrastructure Scan
ADDRESS: 0x14b51813b0629ded49eb9438164293aac660d6f6
DEPLOYED: 2026-04-29 19:39:23
LAST_TX: 2026-04-29 20:30:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
â—ˆ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Handshake with node 0x19753d12 successful. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Allocating stack frame for EVM simulation… [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Verifying ‘require’ statements integrity. [TRACE] Call sequence: 886c -> 8323 -> f143. [VALID] No critical memory leaks during simulation. $line = str_replace(’58ce9a55…370f3de6′, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc9e7d3450222f27725adb6202929cc388fde4b4e 0xb212240c5b500e6269b85ca170db939c39c0c00b 0x066020fc68ecc2fb225eaf1af765127fdf60a496 0x966a0ee19c48931987076991f1e556b91893f9cc 0xec738772f66bb85f078814ec7971e1d2c36b0ca8 0x9391830e55b1f050d44dcd46efc28cead6fbd93e 0x4c2f04c8c0c3d8b14adc27743287b2de30e80f23 0x025717554378f278257f6e91965ff9601957a2ab 0x8af00ab2bcf8f1ec54a1f39b12990f375da1d434 0x3a6d666514a3edaf3c999afc05ac2dbe3ac5b1e1 0xa111c141de4a5a5cca5c9074f2dabca4a5cbefec 0x1157a9eb379473d4e3f17cf4e58d460f8b6e3f6a 0x2fa19bd16e18f9e21b2508f6acafa672f94ab019 0x189053770aa1f684d717b44ceaa8311a6f695a9f 0x006ef920e875b82586a6cb6da6f6c2917107eb48 0x5e2d13bab15c35d5e4ff8f0f3c10351f5bf10878 0xbeced7467bf64ba14f2784ce13bccdf44bb3afbb 0xdeacffeb4cb228383d5fe1958d0ab77fa72fd3d6 0x8cbf395b229cc1b4c47f9b506ec9a7236bc02970 0xf860bb0ae190296877fdcdb35ef6fc0f5e488631