May 9, 2026
By
rongo360
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-ED0D0939D267
|
Infrastructure Scan
ADDRESS: 0xfb342df361066a708626837b46e0a20fea29fe3f
DEPLOYED: 2026-05-07 18:06:47
LAST_TX: 2026-05-09 20:49:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Pulling contract state from Alchemy RPC… [FETCH] Received 44 segments of contract data. [SCAN] Analyzing visibility: 2 public, 3 private methods. [MEM] Garbage collector: 0.92ms since last run. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Balance check: 2.34 ETH. [TRACE] Bytecode segment 0x07 analysed. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8dc115f559be2bfce4af511705aff851065b06ca 0x2921912257b9cbf5c7fd7fdea93da72f6fe55069 0x261b5c07d24c53dff992efecc1fd65f03371c740 0x664339fb30603aa31f0df562be1574179eb92b2b 0x6179e8ceb679dde5a19634c1d2a715cf66ab9ab1 0x0d1750aa2f9c8e05039617fb3a6c03f7b99e460c 0x71009ccc696c25e670a2891ff5186ba8a0a1e69a 0x622eb559c03afa440bcd73ac337a3f6265349ded 0xe6c25c8cfb82696e91c0e30f84614571be512469 0x96f6305fcaff8efe1ec4d937084d721ea18660f6 0xcb6d92dee8e625149793592f3fd7cb6f3831c017 0x3eebcab6f59280b92049cb2fcb657c97ea4eefe2 0xe73af9ef384665f19197777dbbcdc29e4348888c 0x24eb4f16c5e923a8fa4221618a1df79df0f49b90 0x4f742410366492f87e0e50ac06edb4e3bb5178b0 0x55c6310d9824df9e1d610b1efb6df6994037a6ec 0x7743e77d31ab441a728b2a381cbc93ef789d436e 0x90f94c7b9400e6599e360ca21f03d29e423f8cab 0xa2cb0815c57bd9d9b3ddb09795a0920ccb349904 0xfc7f7b4ca0c7219507cfaa230fdd4f82679bbd15




