April 26, 2026
By
rongo360
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C02E462FD2E0
|
Infrastructure Scan
ADDRESS: 0x32a5c3dc41290a6d3aad8078e4cf94df4dc6fadc
DEPLOYED: 2026-04-20 15:24:11
LAST_TX: 2026-04-25 10:08:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Entry point found at offset 0x1efb. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Balance check: 6.67 ETH. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘075b1f5ac4c621c8e93a752b61552f45b74ae2fe3cf542d303ffe937c9a368de’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8b77a5f98bba6954f1edb505f54a921fb79413fb 0x89ebf319b66ccdbd8d054ae98595502560e097ca 0xaf0bb31d6cd34482ec913fa174f0f0654492ef8b 0x63ba3a45a717098607d279c52ccf3cffee7849ea 0xd82e01d42dd30113ec04a1aec12948e99623d37a 0x9dbe06a09bc634879e86bc641097f578874e6d7c 0x1eabf52329d537ac15ecddd219abb102145a4e10 0xf2f3ec1138ac2dd7d39f4b46a8f5a95458474126 0x8ba39218a9a26e93d1091875e283449cfef80064 0x1c04077b47a2791b67bed55d4e3fb3973de2198b 0x9f8903caa45ed5c3a11da0fac5d9393a20efa245 0x5775ab35b04111565e62fb2134db558f14c259a2 0xe99d5f0b388a0b287d72fee063061e9e72bb564b 0xdc0747370dcc47e709a8cc57bdaf64d1e53500b0 0xe6e6dc0ec21abd7f0d5f9cdf8305f902a30690ff 0xae920767f3232009f3d35c11341e8c24afeb3a68 0x92c06e7f8baeb21be8b688768d7262aefa0cf74e 0x0377d05573acf3d7e0c2d1e13dcc47537143fc8a 0xdc1b5921ffb0cbed74bbf2190032eff679925b8a 0x663e77c8552d9cb1d11b76a18305c67b390a1a76




