ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CE8BE4DC0B01
|
Infrastructure Scan
ADDRESS: 0x3aa534ed8cf4a123f993e36efbbc410bf4fb11a6
DEPLOYED: 2026-04-30 18:45:47
LAST_TX: 2026-04-30 19:27:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Pulling contract state from Alchemy RPC… [FETCH] Reconstructing ABI from function selectors… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Allocating stack frame for EVM simulation… [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Mocking MSG.SENDER as 0x5be6067e067baf8bb6db589c11257dfe2eb1abf7. [TRACE] Call sequence: 9f9e -> 0012 -> 6a33. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘0x5be6067e067baf8bb6db589c11257dfe2eb1abf7’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x93bc37e8b46e26d8935d57fb1698fdd32da592c7 0x33eafe3dd4de753cbb129f84d37ec4cf2648c4d5 0x129f00b03bfa2b42dc39a4d2d36a83088a1ddb9a 0x7569240c5afedee0330e536190c09d017ad5f831 0xc73266982010869f1275615fab94e5d6ad763073 0xc88cc9bfef43d40c47cdcc8199c23428a19b2477 0xbd35b965f1e59506d0843fb30bbda0efe4c20a91 0xb25cbc525af48e8f1fb5f9fd8feece2b29c879f3 0x4f445dcdfb7e69e38a148f0d58bb0a0702241a7a 0x21ca0a83a50cc53c051a4bd5a915b47adb2c989a 0xb667144a1db689ddd3ac66d460dded6cb4c6d584 0x897c119b9262d2084f66413e5dc850b83dae2a3c 0x29ba3297c721ed2766dc7206b219e48091b5d031 0x6e7be00102a1c3627252ab77cf8aa6c0d9aa435c 0x9ee69fda21ff2cc6eaeca3dc60aaa920f5a4cc71 0xbfaf5604cb98cdaa7543d62e25666c67f82bff36 0x2707976ef33fa59a88040edbf4608f4422bbc57b 0xac510ef9e1ee169926fae7b68b7c25614f3f93b6 0x05823a56084fdbd9009d90d2281a672933a3daa4 0xc1bb6a2e0bba594bd67e23c55ca57fbd3394cf69

