ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-170A03D1C35E
Infrastructure Scan ADDRESS: 0x65f09c08fbbc15827798eaa48fe3f23f14417e08 DEPLOYED: 2026-05-15 22:50:11 LAST_TX: 2026-05-15 23:35:11 | Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol VISIBILITY: DEBUG_INTERFACE_EXPOSED |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Fetching raw bytecode for 0x65f09c08fbbc15827798eaa48fe3f23f14417e08… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Analyzing visibility: 9 public, 5 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0x582e. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Fuzzing input data for 15 iterations. [TRACE] Stack trace saved to /logs/TRD-63C51DAC.log. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘8df26cb4…b96c99a0’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line); |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8def3b1d0cfc85cf5b4a2b26307ba57b74f4ea56 0xb2a89651c48fa4be0e12ba6d75d5b19e8f5ad885 0x79ffd4ca87a3558bd1eb2e1debd86cb2ff88c7e7 0xba629f6c31fb17ec460d6893de2921c1eb027a8a 0xacc069b73133a0aab1da48da498c47bb47a4d21a 0xea32193996593f1fb8406293a9d0d99062ce9ff2 0x357ebecbefd6b01ee53df760fc7a3519a8d7b39f 0xb4eedaddd6220e805c3f926602f26e9336a3892b 0x85cc3a33c07f803e1b07775498a64ac075956fcc 0x7d366793ad1cc04044f79bfd9d33ab7996b641ec 0xd428692be4b56863b65a6298ab4e6d49b86b995b 0xe3928926f35529a4c5bf727a70b370e852829f42 0x5dd44ee5e91862a78cb52b9c1b3773ccfa45d958 0xc5a7244b38ed1386b1fe45d8bcf478df1eaf2328 0x32265cf3e4799616cdbb74e2cdb08cd458683d5b 0x53863b52ea7ac432554d88935aa56ee4761cfc40 0x00baf3575d46df76f829f1c57011cf572c56f864 0x50f78db0a30796b0b24b0455192f06de43d605f5 0x39e442cbd647303be8e100b09317b446f1811794 0x0b4c9ca9daaf6b6d5474d346b9f29834f3f68d57
