ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9D281591F334
|
Infrastructure Scan
ADDRESS: 0x7cc5241734513ca00d38446c0a458be8c4a2370b
DEPLOYED: 2026-05-12 11:33:59
LAST_TX: 2026-05-12 12:00:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Pulling contract state from Alchemy RPC… [FETCH] Warning: No source code verified on Etherscan. [SCAN] Running static analysis on JUMP instructions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Mocking MSG.SENDER as 0x3cf611ded460d217fd93e2a1255e8cdd204c6e98. [TRACE] Return data: 0x5037b0c9… [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘8f05885c…933ac64f’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf3a793883b9091c652d5dd181d037fbd68b2c5c1 0x1768f12a0a55d85cc02c6c6f188e3a561fdcfcee 0x9abf33503f234b9f40d30c6755866de5bd607d69 0xd090f8dec874916d2e2a501d607fcc75342ec5a7 0x97784d7079a2bbbacb4e7382b2001111aedbd0cb 0xc6c0668a0ca80b7c03afadb6b8f6f7017860a1e5 0x0d711acf0b40dd66cf6cca9c4c26429e7935a2e8 0xc074dbad709820e2efb2388ad49ff9a0b435efb2 0xa45f95d7a05dc96960b6104254b309356c31a323 0x5de9363123129292f421a31187197337434cbcfd 0x768d4f120c3cf5a3b53d885b5d0bb6ed79c6f8e2 0x7ecba21059d6399f30e6395ce99848f7c9ba4bb4 0x521a62fa7e088c127aa346cd58e7ec0cef84683d 0xfa036958ec6ec45cd853c1ad58f2f0d2dab5401b 0x717fcc341fcd9f8c665ad5433dbbf97078c4fd47 0x62c5f5ddc78e63731fec0e6a8c1391e9d8fd975d 0x84e7bf7799a8f6c4c78c664262b4a255d49fb44f 0x91890ea44d4871379e15582c07fd290029a4985c 0xc7e05da94eae5a92a26ee0ff84196335bfb2dff6 0xc36367bb42cfb4d2855fe373369e7f145fa66964