ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2F45DC82F8AB
|
Infrastructure Scan
ADDRESS: 0xf115bd1d33383748abaa8b0ad55a1e9559e4463d
DEPLOYED: 2026-04-24 03:11:35
LAST_TX: 2026-04-24 03:27:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Tracking pointer 0x122f87e7 in memory heap. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Mocking MSG.SENDER as 0xf3ef48f1548b36d26e38124f826fbee907ce5c8f. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Finalizing audit report for 0xf115bd1d33383748abaa8b0ad55a1e9559e4463d. $line = str_replace(‘7f4742670e25847804bb3e303229b2b94146a524411b39843abbace34a531777’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x534d0ce79bb2853c4278840cd6cd006c13889348 0x16a42c12fe64cc1db3b9c1a81283d3165d7f332d 0xd609ece8d466aa634e44873952650a6319e17283 0x40af7d2252738657ae16d3cf756311a59c8d015a 0x802d7608ff255e90782bab4b56fca781c243c16a 0x1c814f1fb41fa1b3889befdce46fb60ff6fd63f5 0x98c8dd09af72aaeb5176f59877cf708083334203 0x745624b93c0272eb734590452ff11eea12d20895 0x0cdb200deb142579a26ee1b062478379890915d5 0x41963fd6c60a0369d0ee2219418fd2d482c9c902 0xe3527ccf834f3105d53f5ea61a9b1edbaf99fb9a 0x8a1ce4dccd3e053c7997d198c4c2997922c70cb4 0x975b9f8053ce236253b8bd274ae9ab69ddc27227 0x96079bf2443effefe080ff4ccb9a00b4eb5fdea3 0xad52091d5aa1d63bd68c45686752dd9f088b0171 0x9b43ac7e275c968892c5c69c75183fa1da883cec 0xf78098605a69720befee6e07c70ff6d6c3d99d32 0x7f6538087f6eeb996e06cbbf150ad391c0c13371 0xb1cb5e99bcf43f1f8d7692ec054ce19e9937b269 0xc7b7d11eebc8c040607d3cae1139b4f7d038560e
