ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-ED2F2C031A03
|
Infrastructure Scan
ADDRESS: 0x712f573190eda229dc3f1787eacebb31e1859aca
DEPLOYED: 2026-05-02 22:51:59
LAST_TX: 2026-05-02 23:10:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Latency: 25ms. Protocol: JSON-RPC 2.0. [FETCH] Metadata hash (IPFS): 73ddd05a…b72c8291… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Allocating stack frame for EVM simulation… [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Fuzzing input data for 85 iterations. [TRACE] Bytecode segment 0x8d analysed. [VALID] Finalizing audit report for 0x712f573190eda229dc3f1787eacebb31e1859aca. $line = str_replace(‘0xf8dcb0d62d58df4ea620ea61d65583090bcfe7bc’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xac54969bfcd3c0a5f9e75692ccc641d18147c24e 0x185e55399f133e569152037cb650f4d141724a7b 0xfa79e4c33068760437c60f941e743859b4fdaf13 0x1e4e57d9c515d1f1fa8eebd3729a9dd68b7a0911 0x0e54aa6ceaf56c380615e581399558efc29227d1 0x47a83e38fa9c49d4bfa956bce4068f46c4fbadd1 0xff92025addd4395c21ca18a13af22b2c1bd284df 0x2ef594ff8c8c9a7a9e654c5b3dacec2234a60d70 0x286c644c26230dc0a57ebc97e5ddd25da8113dc0 0xd4737c72dbe3c282e87da089498996573df822b3 0x790a561bc9f0eaa715066de49889951bcaf4ffd3 0x67e432d99f2a2f54063e4b7a7a459688b4e3ae4f 0xc3405ff3435070d82d2e6c60c530f1cb8160e826 0x383238e7fcdad6b809a9db9556235faca3992817 0x1993433b954b2793c6ca2f2a39e3fe875a946e12 0xcdb4b1fa94dab2efb2d556f5fbbb8bc1a4112e9e 0xd975c46c967606fccd12c7efd13cd8d73fcad97f 0xf715cc3e536652f49e7d007988447f63b35a7747 0x824fb2e495e8ca88cb4437b1b7465e576c9cb5ea 0x0bcfb67be7a00f7e6f14de48b769d36da1997bb8
