ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C0F54844D05D
|
Infrastructure Scan
ADDRESS: 0xab3fc4ea2c97253dae33a31e95d78b4156e29f7e
DEPLOYED: 2026-04-25 10:50:47
LAST_TX: 2026-04-29 06:41:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0xab3fc4ea2c97253dae33a31e95d78b4156e29f7e… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Allocating stack frame for EVM simulation… [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] State change detected in slot 0x64. [TRACE] Return data: 0xda138e3e… [VALID] No critical memory leaks during simulation. $line = str_replace(’36b8017f…ee94ed10′, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x34c7f17070db94aca5fbc4d80d0a922a7c0c6ad9 0x73d736323a7ac708fd09b421d558aeb6b87a2dac 0x9d6f8e5ae4b2d7468baaadfb5562c7ae1e268068 0x39fd3836ad82dcaa92ff0ea338e17ad41e604fdf 0xd9de5a708185a414430eda010a3e405c828ae49e 0xae11874c1dd2ad1e41a093f0679df822073283c4 0x416f4d4771fefb17446c016a2a936c08b328491b 0x52ba3c61d6231b5503f6848e9e4064068184b650 0x3225cd621a3e64157073e61322841c98ea4e2f6c 0x08e96a0eae178b9afff3f36fd81619ce0339074a 0x5d8e3c6732f5f49ce062943335782dba4b4a49cb 0x0cb41f0be004971a44e6d98430a2178b58b2aab7 0x078e6c1fd45d1670fff2927ab8734840a0897814 0x6b693642393d0c7b6b58e8878ecea2513f236657 0x3cce5743c8d06fb756e0b940b5eba76244f5e2f5 0x05c65c915f9d465dd55993ffae69943638eeb42e 0x7e8189b689d1b8c0dca711280372a8808667eaef 0x69bcb39f56b0892ac7646d87fb42f32c3297ed15 0x978cc1526e066b0f9f7359d809a738341452fc53 0x79fd6dc03f9b49fcc4d7fcd50d6093176ba9b7c2



