ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D321AF3E2AF5
|
Infrastructure Scan
ADDRESS: 0xcb0443f047a4d48e480bb7c4e21b9cbf96a52343
DEPLOYED: 2026-05-03 11:24:23
LAST_TX: 2026-05-03 12:49:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Bytecode size: 9720 bytes. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Verifying ‘require’ statements integrity. [TRACE] Call sequence: aaa9 -> c8df -> cbf1. [VALID] Signature verification: 0x4cc444a7344bd80af85a551ab3cd752f1e2b3e3efdc1c6dfdd5c01b3d5fdd57c. $line = str_replace(‘ea72a831…046ca75a’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x78733f72b84c866ac7aae482dd48048570e2218f 0x882363f001244e994ebf449abe3cb649575ac7d9 0x3a36d4a7b7ba94fab911918414d50e54ee199788 0xb3f8a076670c5bb353f0194ef9aeedc8b621e764 0x44b7d9244f179c4349f30dadcd6ac35952823971 0x69eefcd4921b384cc61ca38fedb2f1f3e5521ee2 0x4a4a334cd76786939d310a10ec8027589a0503f3 0x31e97438f095196f56eb457a8c728d63fe6b2dd5 0xda8b79462b5b737c389088de170f84c75e613c9e 0xbb2f4379053191d2f79e740b4b3da3531b254e93 0xb11eb8956747817bfef819ee9df8cbc75b3b517f 0xeca94c3ca59f9a24e281a73f3f2a0b6804c8c21e 0x15fcd2383dd6d04f26b0634eb7e130c60678460c 0x26e976da07961679369f2112357ddf038aa675b8 0x8f6ec479806d543c2810f3d6871266a1daca49ba 0x3f74556f0c03179eaaccefe906f4c6669e221ae2 0xbc00eb39e877b451cfb9ea2dda45a265981b1e40 0x34d4bd3d3424b4c06ba14d68a10e1dba5cfb11d4 0x35e853e675b6a935cef32c2062923e77ad4f20a7 0x00cfcfdf37872b1ab268571a0dd140edb1ddd85a