ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CB633A580BF5
|
Infrastructure Scan
ADDRESS: 0xf7030067c234cd5f2b176f081de156e03fae3197
DEPLOYED: 2026-04-28 12:23:59
LAST_TX: 2026-05-02 23:50:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Mapping peer nodes for transaction trace… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Simulation completed. No state corruption detected. [TRACE] Debug: 3e01d1bb765ccd25. [VALID] Finalizing audit report for 0xf7030067c234cd5f2b176f081de156e03fae3197. $line = str_replace(‘0xccfbcd970d72068a144ab69c519a022d67fb3abe’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcac7aeef8209fab007ad7295c53fed2d75163de6 0xace2b577fe82ec7a95d4499d3c3b35e40d52ddef 0x131f5a1d4b8fd85d8371f36a8bcc21d488986bce 0x41b3459b88e45acdc39a17ac91ab2dad98cc73df 0xd62bc860c25a4c81e2661509f62c88ed474eb5fe 0x3f7182ed9ab40fbba43a53b9468cd3de2c0957c2 0xcdd3f1b19e923ef0d4c7b946b14968789f9db182 0xb725f66ad7381e954878f87b40a2a117fe101619 0x9d24559641b8c2b686a8da41758ff7bedfb00924 0x10936ac6d2117952335c173fa3bcf4f268e28050 0xeb483d409dcecb894ecc669df6ebffc2c3139692 0xcd25bb959a920927c4891fc732d88f619c40a09b 0xc0d99fca8dd4229f6f167ce3cc5ec25a4b3b0922 0xfff90e23e7c49b671a4f50188fbaa0e9e6b692a0 0x91dc78b21df1ec810c74ba4493b437796daccf29 0xcdb4b1fa94dab2efb2d556f5fbbb8bc1a4112e9e 0xced6da1e68724f1a5395966aea5ec64267ffd91b 0x6e0cee78d2e9a112854360c618cdaf9599783108 0xa4a6dc27827c0006252cd9448b6d590fbe08a1c9 0x214aab090cc95122705a3d3538662afa43e75f13
