ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-52E45187D461
|
Infrastructure Scan
ADDRESS: 0x8b07f1a5a1b47ef1ba44565d9237edbb25c6c2a5
DEPLOYED: 2026-05-04 23:04:47
LAST_TX: 2026-05-06 13:44:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Pulling contract state from Alchemy RPC… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Identifying function signatures (0x5164ed8c). [MEM] Allocating stack frame for EVM simulation… [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Simulation completed. No state corruption detected. [TRACE] Stack trace saved to /logs/TRD-91DB88CF.log. [VALID] Data integrity: SHA256 verified. $line = str_replace(‘0x46f2b1f2f523645bc1238e2bb6366f943e6466e1’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x15e5eae530cec1b8da15465ad1934014ba73419c 0xd790524b095835ff806e844b9f454440ae551ba9 0xf42adfc3399096451562a2c03d8af766cc46a060 0x6770f95234313ebb3edac0f320bd58db3452a08b 0x37f226ea69102bb89dc261d8810afd4ce5c925c9 0xe1f8c05108678917edc4778c3cca949ccd73ecc3 0x3aa007d268e94026536ffb42237e8f3c3c898769 0xff9e07c0a9724e17c622f11c71cd43cf979a3a24 0xe892cb529b707c666eba663fa18f839eb4ba16ba 0xe02afe95ce0d3e14259b9e7d515b9614b64c5e91 0x10f0ec179df8584b284d90d2cbc7ed2e64527f51 0xb270de8faa9dc8d689a0320d49ea00794442c166 0x26f413b61ba739868ad0825ddeba9eae96563ed5 0xf560dcbb3fc96990fd7f22086ce147aebb641b6f 0xab7c6490dc51e10630a017446f821fd55cec328c 0x9dca4074d595de4bd227579565eeb44c3addb8b7 0xd55b3241e7c41e74e3a36ce951c5a7126c810d47 0xc8385454c2737cb2af2270109761c00e1308f6d9 0xf9ebabd04ec14032c569d49c59e58df0630b6b7e 0xa78c8ff32988c3b20166cd28354674cd7c8fb265
