ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-DB7E6BC71F60
Infrastructure Scan ADDRESS: 0x02da2921522905ec15792ff77ad110e04eefa4e6 DEPLOYED: 2026-05-15 14:59:23 LAST_TX: 2026-05-15 15:34:59 | Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface VISIBILITY: OWNERSHIP_LEAK_DETECTED |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Reconstructing ABI from function selectors… [SCAN] Validating EIP-standard compliance (ERC-20/721). [MEM] Simulation buffer: 1024 KB allocated. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Mocking MSG.SENDER as 0xf9c0c0b310db0500f9bde92f91deda586a9f294d. [TRACE] Execution path: 37% coverage. [VALID] Signature verification: 0x82310d5122cbad94442743899ff5d2df792fefe8ef3f116628806ffe3abcfd7c. $line = str_replace(‘529d06c44547d6e29dc365e41d14cc2727b9fadcc81a06861c4db3879c106734’, bin2hex(random_bytes(32)), $line); |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x16cfda746ab4dacbb40c9cf31ec4658d4a3e7191 0xb71d44ecaf05d07a8b3c832e5f57e390e00e5103 0x6eb662af41d34fe7a5b6b0ea1343b98107e93c47 0x5ac41ff5861991dc961dc86d77edef9df2268bd4 0x949ca384e214b94cbbe764e009c446dc5cc65030 0x738098ca7c8c023fe8e2f5eb4db9f9fbea94dbc1 0x38451130f7972b6b408cb017f510181a2f66dea1 0x57b9c0774d735647ccf7b5b5b052801b191b802c 0x453e71a0268553d5640e2901204960d9c0f33657 0x1c6016f9ec1309af01a3b315bf4f8c8ca42c7cd2 0xdced0523e515c727d41b64c3879a3c74a42694b4 0x28f05bead7fd171a6ad13b918bbef02d3aa68918 0x0f678b69be1a8c1374390b92c09733cb455272cc 0xc7ce54c93d6acad80c788a799a9e1fc84f3f0c26 0x0579397cc1bd9fe003aaf77f18ad186d3f29a879 0xab2e76589d9bbe4aaeb7d0f062b9d17a9a8d84f5 0x0b38e582ed4c78d177534a9f64b7998f3b931fef 0x5b86454efa9c74a308c662da5b46de8edc280d77 0xa9914d74c6bae1d5fc89d7ef0e34862a8f9b2dad 0x5681927f3f7783a10f4368ddcb32ba2fc4267497
