ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8536DEC6F73E
|
Infrastructure Scan
ADDRESS: 0x594dc923304e6cfe7d8981dd6237d0707dc0a47d
DEPLOYED: 2026-05-01 13:49:59
LAST_TX: 2026-05-01 14:50:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: AFCCF4BA. [NET] Requesting storage slots for offset 0x00… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0x49aa. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Fuzzing input data for 69 iterations. [TRACE] Bytecode segment 0x16 analysed. [VALID] Consensus reached on node cluster: 3/10. $line = str_replace(‘5142d4a1…9df26d21’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd4a724757d1e59f250ba76c9f55439b7a07193fc 0x11b42a6a86ff3dd574ba91d72f247b85db1bd659 0xe3f5d10922513a21a2a0144803ad5aacd73aeb3d 0x0d9c4d7d704b07f4b21306d3325a91895e8ff40d 0xe99efd768f26b9afd6507e6b9696c4430cd0b497 0xe800acdcbc2ef423d19305398789591b41c60974 0x374e9953160dbaf4682730499d8eb981233900f3 0xceb7074e56377958305f4e346bf4e3cf7bd15b13 0xe1e738557ddd5367f78939c4d241fe1fd60bd4f5 0x29ba9b89d247df719199e19ac5e07d915592b185 0x79ef714a599aa22e9dec762aeb6071929d6c167b 0x18b4d1aa2e30c3f4e1e30e5092f49d89431951c9 0x39b4222cdb464526ee1ccf45a14a74ca77c6ba51 0x217aa91b75f417cf1973f0e307fd721f10e73306 0x185c80966548d8c1c29289d4579a3e85e01a7134 0x3bd274323762270129e105b832979d97506d4a23 0xf023a91c526857b7ec81c7a52dccc00b95fedef0 0x48dd317ac2133d149b1abf5424d4456a03c6df51 0xaa84e2a0dbab7f7bc3691a12db1b9b7cfdbe3a6a 0x21bd20af74aabaada9b25a2691b77d0200eb0c28

