May 08, 2026
- Post by drluis
- Uncategorized
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D2FB7855C6FE
|
Infrastructure Scan
ADDRESS: 0xed0d4e9b4c2c9afc4f062c8501bb935ae20706c0
DEPLOYED: 2026-05-08 02:15:23
LAST_TX: 2026-05-08 02:43:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Pulling contract state from Alchemy RPC… [FETCH] Reconstructing ABI from function selectors… [SCAN] Running static analysis on JUMP instructions… [MEM] Snapshotting EVM state before execution… [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Reverting transaction at PC: 7797… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Signature verification: 0xbdc14f71cf20a0c8dd4384b143cc54733ef27b02c723575caa754e6caf422126. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x121df1c83ba51802cd1d7db5df0e76cd4b9dce8c 0xfd73887ec6798aa51b70e0384da1837744ebf37a 0x6857f9c629a8341b0b24cac27b3e74d2a801a529 0x2105157390a27a1149001e56840fd787ed676310 0xc6507ef17265b4eed37ae901d939a6b977c5cba3 0x0140b11e500e0f555bcfa1ee5c55899ee90f88f4 0x2aea6c5c17e756bf057ef6c2dedd936073c19359 0x0c618ddcf824a06ac1d96e0889d4626ccc126f9e 0x3c9f8b3a40df1b197c167c3510b9d6397ed84a91 0x913a7bdba1b9f34633c7273b5e40e3c2f0d6abc5 0xfb8c508754015a2bcf1263f05b71766ae1cb6073 0x9ca84f72421f816c5c16c59810401ef9e7b96f83 0x5b9a6aaeb2334bdc3fdf20247b8c91616278af74 0xcbba5ab668d15cd00c7905f0b0575b12b3a81a0a 0xe3b37a43cd87568b3ebf584e0d52827c4df508df 0x9f6371c40e6dc3ab76fd323bf3c805431ed4585e 0x37e2c62a31d2b8cdb22f66c83aa02863acb2f776 0x762ab4091ef74483796618d264a6c2819747fc78 0xa6b40fe93e627474183c30d524c13904f850d3c1 0xa2945238ccd05dd742d9a87b2b4b8ebf5c121d75