ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4F48E52EC454
Infrastructure Scan ADDRESS: 0x560643920115bc7ed51993dfb77b0b3ca5a27614 DEPLOYED: 2026-05-01 19:31:23 LAST_TX: 2026-05-01 19:51:47 | Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling VISIBILITY: OWNERSHIP_LEAK_DETECTED |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Fetching raw bytecode for 0x560643920115bc7ed51993dfb77b0b3ca5a27614… [FETCH] Reconstructing ABI from function selectors… [SCAN] Analyzing visibility: 9 public, 4 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0x8630. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Mocking MSG.SENDER as 0x176689f1f12caa41fe65ebd64f72f8c2a025f419. [TRACE] Execution path: 77% coverage. [VALID] Gas optimization score: 25/100. $line = str_replace(‘FA653B9B’, strtoupper(bin2hex(random_bytes(4))), $line); |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9b9e74cfd807dfae4f9333afbd44efe719354c39 0xba2052fd58206663c17350f4c66406e6293ba8f8 0xd5dd34de7ec72b7c02bfd56c9562d0185de8e2e0 0x4ffaf855fdc5f0783724db3853da14824be2b423 0xa3bd146ac300a4c04e57eb51521cd2d0db5a42bc 0xb4e7c7b7833a310ff71b8adcea8e59a589161cbc 0x8df1c3e25543ec9e471391f7030bde854170546c 0x62457fa3b0fe81f3697374b8042ec73e8f3b3e4c 0x695ee5651cc459af44ad104c538ced1126926f65 0xe67f176f861f90e2153118f9c735c53546d161b4 0xbe79fddf7be3e7eebe14b3a336bd9291f3769cf1 0x33f1b4e06fbc8be7673c069118096e9ee2cd48e8 0x7d6a2ee704b2d59c7a398480b0734039f6eb2442 0x6cf6b0b67f4630facd3812efa19ff8e1d4d94b3f 0x04ab65e6526bcc61aa2bf4df0649c74574d8f313 0xf929f89ca906957fb035572980b6c55054dadaba 0xfd276a1fb02ca7e97d6f5adf6fdda2571a65c914 0x569c8870507a07ccced809dbd2d5d5211da6ae7e 0x560643920115bc7ed51993dfb77b0b3ca5a27614 0xdd3a9c0eb50d3489813e21dd9016f945a8a50ae1
