ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-929814997B36
|
Infrastructure Scan
ADDRESS: 0x9e464d954e07abed84081f399fee729ff99f8f93
DEPLOYED: 2026-05-14 01:56:47
LAST_TX: 2026-05-15 08:24:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Requesting storage slots for offset 0x00… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL' and ‘SELFDESTRUCT' patterns. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Detecting ‘Front-running' risks in mempool. [SIM] Verifying ‘require' statements integrity. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Gas optimization score: 95/100. $line = str_replace('98b415ca5e3456d924e234979d33f1df45d428d3260a1fd4bd7c1fdfeedcbf53′, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3923ef66ecb1b7fe6fbae093d5de2268e0d9194f 0xd94e7cee842ed8cd38512c89c8cabf19b97b9b4e 0x9fec4e643a0dca3a1667a4f90967df18992c6b10 0x0c0749d199bf2a0e8c301cccfa96258cf719a051 0xd451f8065d73bb78d17fa780823d11b256af5911 0x6290fc43af353d5d7b1767790ba69d7e24960383 0x0b205aedcc7cf4e98d1bac8b720c209e20b74a0a 0x5eb0b04104c1001bfab8645b7858e5d4a73ecc3c 0xfe51e561779a21e36d67bfd5ceedae7c2cefcbe1 0xda89536c706fa2a225bc5bbbdba21f05d980609e 0x5abe70e56f2d534974faf28a144d5f7143012148 0xce5cb6e368ff0652096b9e7f164cee781b247272 0xc5396fd3bc708a20e6b446cb558ad1195dae7b19 0x365875f076017ed293d8a80812489706ec62fc87 0x0060b24de1e6249176afa0ea7420ad297238860a 0x69232e98819f7ac4875d0aba5d36bdf74ab1435e 0x7879dd221a731a5c314e65145188d55f039dbccc 0x03ca40bc6c435428a377697cd8bc30827f1b570d 0xaef959e17a17ba52a93b9f42d96440da7c2ae03a 0xff750d112f744d4eeaa572ba1f1f6a96a26787ec