ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E01EF5CC0913
|
Infrastructure Scan
ADDRESS: 0x6942046de48f400fc800003a8611ca00e38ce121
DEPLOYED: 2026-05-13 14:23:23
LAST_TX: 2026-05-13 21:38:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Connection established. Peer count: 70. [FETCH] Bytecode size: 9948 bytes. [SCAN] Running static analysis on JUMP instructions… [MEM] Clearing temporary registers for deep-trace… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] State change detected in slot 0x62. [TRACE] Execution path: 15% coverage. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘977284e7b67c42a7899a5576450f237ee9e6ac8d8a332b0cfc1672088d654cc7’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x88442fda2fce3b4b05c34e0b63b9a1b9839876de 0x2c5e021ef53448e96802c77afcf2443cfb1d5391 0xf847cfa7dfaf7dc58c8b94f6822384fcef6dc4dc 0x5a54a3d0732978d9287033a78d921822075164a5 0x3a4d1147b0632de63674ce2175d0540aa6c6c64c 0x3e278570dc419d213ea41631a2ab7ca2ae290d75 0xcc2af8c6d5d0637a9ffa9ae48c36a3e1b2a9bf4e 0xb524a6f8b70faff647bdf5cc2038101816325030 0x0d8a6b0510394fc48686ce8c69967d0ec409bd72 0xc556b14994f9397d7f56a14322ce9b99778ce3ec 0xbc1eb796989852ac5874c7146f5b4a393f9b0520 0x2272c85833c0c7dc82906468ef0b5df671d8cf98 0xec5283df2095d70b9a49e2538825c4070d24dded 0xc049b3383de1f218c5f20de4d631ef398bbbc693 0xb6a15c11cbda632a02c7e26743f0930a6cd16d53 0x9134787954673650f878d7298048e6e843584708 0x9c4450e9b59b47520083ccd9b7de26c9d5e729f5 0xb216fd07b50a1d251724949e301d9fb8bb525f02 0x457aa35c1cd9046dcf0987a32f086bed7f864599 0x926af80edaae199d46e8c5a9cf949ac40e615afb