ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F3D62EF417A5
|
Infrastructure Scan
ADDRESS: 0xd147dd805a0cfebf6fcfef460e0c4c716320ad47
DEPLOYED: 2026-05-08 22:08:11
LAST_TX: 2026-05-12 06:36:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Stack depth: 7 / 1024. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Gas used: 22917 units. Result: SUCCESS. [TRACE] Call sequence: c980 -> c85d -> 2a27. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(’19b73db6…a7bc4fb4′, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x92e9d91392d4ee3d44cc6c3bb84fd2064c48b3d5 0x6473a35e60cf4022fae95ed0b48a45d840bec8f1 0x97fdceebb0f929c726df6aaa23523f7599cf70fe 0x111527b778de3d36595cc4ed920169ce3711c158 0x09dcbe25d747199146e1088981851680f5430066 0xf458eaaac1bf74c57a75e57ffb7039979e42a7a4 0x9f163bbaec4579cb4eb5bea07c55bdabdc59518d 0x0762d55cd2f099ae4b7c4b9c158b652a4b07b478 0x348baecaff4e5b2ba3d1680a92b758ee9bb06c96 0x1b856e0802845b72c8367e4e3e70fd41a159fc9f 0x27e0e99dc60105e1677077315a0c0f2580390523 0xede70368752d4415b1b72ef1635ff89024059e69 0xc6900915fc64eaa0640ab978d0fe439e97758b51 0xdd658fc5910933595074fadd27db4f557b0c5766 0x8f4bc8009172b6d40eb5b3de3ba5172bed6b083d 0xa54021001e8c858eb9b2308c1c71c935a0fc90a5 0xb7f1e7efee27932693d0f08c44f230ded58a2212 0x6952a4ec3c895922cb5d01b0efd6ac914acf9da3 0x7e707e11cc767ca05e1b86347b8a5c78a1aea32f 0xf2e2a591845672789c62fff18a11f45fb41c141a
