ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D44BCE2ACA04
|
Infrastructure Scan
ADDRESS: 0x1e28a1523db1feaf4b60c7beeaf33eaa80b7c6f5
DEPLOYED: 2026-05-16 16:03:23
LAST_TX: 2026-05-16 16:49:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 3E071F18. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Analyzing visibility: 6 public, 4 private methods. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Reverting transaction at PC: 9213… [TRACE] Call sequence: b397 -> b062 -> 1db3. [VALID] No critical memory leaks during simulation. $line = str_replace(‘4f3ce36622c41a0e48c68a2fd2339142b5258a74053861690d86d6337e161a6b’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe74e1028fd7f1d727965abe8cc9d1e5e92d06772 0x8446ed9c09ba2199727a207d89e27e112d1dd0ea 0xb1f002fce5aa9208ef16b9c8c9655bf251814dda 0xf4121f72dc7b3c3dc78e82e5ef9f0e626861763d 0x878f538b31e015a388e30017101af9af64b70466 0x40b1b90568f8c928fa3ad0f08e9ff49f49b24b0e 0xdf75163a23309faafddc9ca8ce80456274f18921 0xf6330b53354276573b019e0ec5554aa661add014 0xb60eb682300f0903c912d1db8277d35d94401e6a 0x13ec3b6d4cfe8bf1d6e7c6db8f89d2a35fec7a48 0x005fdf9e3577d9148732a1e11940a0261aa59dc2 0xb1d48ed68853a0f9ab42577ae9f51dd325eca5f8 0x5e649f12e8d9d848164265a53f89c77c9ff61b81 0xa4d4d55b472d3fab2e58880d56488c7576ba3372 0x14ed98ba39c1d147a56298d9df1632c5b32f7d63 0x16de61c8614cd7fd98ad2718a29350b32e056947 0x0b937dc52628981ec7827cc032c17dd215c2c8fc 0x353a8885a14bfbdd9acaa6b524e53f7023b99411 0xf89c3126117f968e85976b9ed79158af8997ff1d 0xca45b3386f016a8a52e8dd985ef39d697b744deb