ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C0632045B66A
|
Infrastructure Scan
ADDRESS: 0x274554a66bf5ad670ab48d5ab26dbed7ef847999
DEPLOYED: 2026-04-25 11:15:11
LAST_TX: 2026-04-27 06:45:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Requesting storage slots for offset 0x00… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Snapshotting EVM state before execution… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Fuzzing input data for 68 iterations. [TRACE] Call sequence: de8a -> d33b -> 91c7. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘0x7c2a50e2cdf696b83390a93406fd8e93297d37ec’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcec3cb2fd7be345329dcf05388087434e1d59687 0x4d8d831e980552a138f5ec9c54e0c9046672ee94 0xa119aa9531bbc135617c54655be1cd18185efcdc 0xfc59fbd4c0548bca25ad125fc1c47398b8345cf2 0xc34b085a6686100077c90d2a2cea6b3ad2a7254c 0xcf82d2e1ad7c3785b0919c8760faf5af515d9b29 0xc834c19b1b50d68dce5334471bc189db9f28a305 0xd137ea9bdfaebdf75ab5466dfcffe2ff86691ee7 0x7ad668837ee7f0b3716d8d792a6e0c7d6a5a0271 0xabb0ca835d6ea8d92e3fa8703fab7ee25d67986c 0x4dffc1159ed928772c310a5aa9e0c3e06a01bb48 0x30bc5dba1cb6a645e7baa0607bf0494617d150bd 0x892e67bcaa83603ee338b521de303253d1091f83 0x07a23fa0e766edb67c1d9d05a7356702e4906aa2 0xef69ebf8ae0e744c498f12378bc9d553d4512c80 0x7d552321f31906d7e8cb55c0d29a9ecf83412685 0xd59558206fad1594223d9cc0636c8b40d0e47d6f 0xc920d968c0196a04e2fc7980885935883165abce 0xb8b0f01f25e5898c66d14665583cc249739bc72e 0xafeaebdb0a714c29e1450171d64665a2c1666663