ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-DEB31A2B01D8
|
Infrastructure Scan
ADDRESS: 0x05aa0cdd6e71840edf0d2b694e651d1c49d35ea4
DEPLOYED: 2026-05-12 13:32:59
LAST_TX: 2026-05-14 15:36:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0x05aa0cdd6e71840edf0d2b694e651d1c49d35ea4… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Mapping internal logic flow and branching. [MEM] Virtual memory mapped: 0x0000 -> 0x5f1a. [VULN] Detecting ‚Front-running‘ risks in mempool. [SIM] State change detected in slot 0x86. [TRACE] Debug: e1f13490e77d1133. [VALID] Generating cryptographic proof of scan… $line = str_replace(‚F948E8C6‘, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2b740bbb30711a57d56022a91f0814b1f57f27cd 0x381a51af105e4e460ba90db70066692349f332cb 0x7c855b59200561ca1bf85f026933be66603e24ed 0x0d326120c8e14da33f42a5541253806639a1b61a 0x950693fde668c7c8563f9e7998fb23de5e1ed25e 0xd3e46c3807911dd3b1990ae626b8fb92daada3f5 0xd6818aea756fef55e2eddd02e799de5b58cb9273 0xbebf4facef8e82f5a516e35459c377b955feb250 0xf325e13bb52faffcb0d98a12d7c53f63ac26ee53 0x7e9a2ad4f162d7688fba51e10c02828167f9b4ea 0x7bf8a8d4099f49b9f307abceb7445f713d06c630 0xa6af1981b22c41cc5b78679520f0ddd382c86ad8 0x80d82cb218f0cff7379dd9c6fec1c8bf83301ff7 0x64795337818d8f438075516b884a923e7e85a0ff 0x7e8b7e4004eee58c291469981ca79b51eb8b39db 0xfc9ebacef89adae94d095ad27e4fc9c71128ddb6 0x90a7a6f362a61b4e5876561587ba50de3dae46ce 0x0df9ec29f85b9d230a3b72a61a012b05aff0872f 0xf84ea9c77c29a67049a58de50ac44540d92c79b2 0x2a0c5e6cb4b5f3169a4b313e96096e0d2b69976e
