ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E49C0F5FE3B0
|
Infrastructure Scan
ADDRESS: 0x6829b67da5e31809674cc19b961f7437d32592ee
DEPLOYED: 2026-05-02 17:53:23
LAST_TX: 2026-05-02 18:33:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Mapping peer nodes for transaction trace… [FETCH] Reconstructing ABI from function selectors… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Garbage collector: 0.11ms since last run. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Verifying ‘require’ statements integrity. [TRACE] Execution path: 66% coverage. [VALID] Signature verification: 0x746d6b8a35d7d752d8b35ce7b7b064565028a469b74c59d8a8445875aafc5858. $line = str_replace(‘BA6AB9DD’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa9b412b0190b3e1ef7cd2f7f944aedc29b9d3c13 0x6d35439c2dfcd3a3f89bb21adbbf160b0d176ba6 0x12d19caca9e3c1d4c0807fd3e203c45ea3cb2326 0x2612583b543dcdef2f3fc8573beee43460c8e1b8 0x7d92332c168fe5631fb1ccb1390aa09c661e61ec 0x15ffa67b80d11886d4a6dff9bf7c39226c0ebf8f 0xef59184fff118258755bd830b37c7bdcba075693 0x7e4df2a904038582e3c2b0f27bb34b9e4008e987 0x3067dc18bcf3c8aaa4083b1910af95b917dea211 0x8db5a6aa608aa96be2d3380057738b35d9e3df2f 0xced6da1e68724f1a5395966aea5ec64267ffd91b 0xadc40a10a794968ffb51e834278d3ff865455a0d 0x1fabf01c7e5cfd7facdfe7790c7afa1e77ec3219 0x19a074135d64f2517691d0e5d25d5c93c2834b1a 0x81115dfb5fa0806eb9e974185cebfc5e1adc7814 0xbb5346ff971fd41d5a7e68f023a40dd758e5b062 0x2f6e3b7e9f54ed7c48839bd4fc25deb0d7963e96 0x68285e4ca7d234cfc5f48834a4796b705d239dd0 0xe12e5c7ff54f73c284b6c732115cf08450c9a023 0xafdc22b03d678b9fa8bf1c9cdb3b1b7716f71626