ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0309DAA60E1D
|
Infrastructure Scan
ADDRESS: 0x6211033edc8675c6faf68f91c54e597c529cd003
DEPLOYED: 2026-05-07 20:00:47
LAST_TX: 2026-05-07 20:40:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Active_Trace_Protocol
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0x6211033edc8675c6faf68f91c54e597c529cd003… [FETCH] Entry point found at offset 0x13b5. [SCAN] Detecting compiler version: v0.8.28. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Balance check: 2.18 ETH. [TRACE] Program Counter (PC) synchronized at 2822. [VALID] No critical memory leaks during simulation. $line = str_replace(‘0xde708930546fc9daa8a510e9bbe695e8656800d4’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x368b6f09d6954cd392238aa72c460f34a48b9de7 0x534e71bd4ace3ff1984afc6d206b3f9c39ad40ec 0x38b52850c010731535a880ad23b464a862b030a9 0x5686295a24ad6a0fe3f19b31f7b02a03110441a6 0x84c6e93606cd606125882cae0020a31480fdc828 0x65d7e26b5d1682ccd32173c7965d258aa6590ce4 0x0132891a5ff52be292df677d94e3e887622f7801 0xe8d9269eb6d8e92ff1081ba4fe5b6c22ea681a8a 0x929742b635466d2a0ece8c9c28d6ccc938decdd1 0xc7963d0f98968f0a524bdc994302d649cc6fa953 0x30c86b2ac64c5bf816d5dc4232b38c3ebf4a67af 0xe903ca74a5c90b2926a08f118c40b5928a95e3d6 0x824fb2e495e8ca88cb4437b1b7465e576c9cb5ea 0xcd691e2f2dfbeb79074dcaa19174ee2e6d710822 0x5fc5d6ea65f81eaf72d014d3e09f1aece94b1d8c 0x2b2fbab3bca7053c06ed9395542025cf22417f45 0x1e43dd64ac5c00763f3a650bd73fcf9bb0c6ad4f 0x7fa4c9e8f9d57ba24e54852ac1b2586398be961f 0x7f0d8d47002e26787520af336858840932f9557c 0x3128d27d88273272cd101e2729461242ede601ec
