ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-953697CBEA71
|
Infrastructure Scan
ADDRESS: 0x16955302a7a134f9555f5b6ac374230dc68dc07f
DEPLOYED: 2026-05-10 16:04:47
LAST_TX: 2026-05-10 16:28:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 42B1F44F. [NET] Pulling contract state from Alchemy RPC… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping ownership-protected functions… [MEM] Snapshotting EVM state before execution… [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Mocking MSG.SENDER as 0xae835df7fc000eebc46f135464c05d1b53713c68. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘133818225bc6a1df5395a7aefccdc3f81cb1cc3344461bd1ad4367bf84f5b870’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xad4787a4ae8835286280dd1bcec59d8675e1e380 0xb06a692e58bd94cc5e6d6b86e7df048f7b837a03 0xc07d69cd84b8bd3e2928c6766a29c2473cc56d06 0x9547d42ad00472dc132c617d7f38e3155384b628 0x60048ee3d36649429bbbb2052cda34f85a37136b 0x78ce158dcb28f30f819589658585544f05ea880c 0x671e7dfa85a142235fbc5975484858f2f7d4fa0f 0x94193adbf3866ac72a8a257644139e9f05dcb604 0xe52eaaaa9d502366bd1f797684dc3209781e4613 0xa85e79cc512f73d8dcfdc5613ddd069131644c3e 0xbf1dbbe6d0b623f91f1fe7b1eb68b690985890ca 0x0b5069b7e9222555f3293b846663838720ec8e04 0x7c2e445238c8614b421bd9311219d2d5405010eb 0x8021044676538a0ceb9573f18d7669ea347bf472 0xe433bf47b79e99c001507bfa6cd9dc41abc38cc0 0x99c546caec181431b835c9d992b128ef86812630 0x1dd9315320ef94d6002e8a15761a769d63cbecdf 0xf7fb086751d6da7b3ec12750464ed502eeb3f25f 0xf7fd9b385652e0fed881b406be371c4663f01706 0xc58bd433e4b870b93acc377a6f43e8e2d4d96167


