ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0C47768403A8
|
Infrastructure Scan
ADDRESS: 0x591c040cbc9eb2401f17a1cc779ab240b7fea5f6
DEPLOYED: 2026-05-14 11:38:47
LAST_TX: 2026-05-14 12:13:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Bytecode size: 2567 bytes. [SCAN] Mapping internal logic flow and branching. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0x765ca050584aae87de954390d4ad97d27e428d0c. [TRACE] Bytecode segment 0x88 analysed. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘0x765ca050584aae87de954390d4ad97d27e428d0c’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x884f8d95e3aa9606cfbe54596dae22ce58f1822f 0xa29d4aa6aacce077a587c2823286ebee03d65af6 0x1d06b58f196fa49711d6ffb29eb93bb9793b7ab6 0xe365ba482a0f996b3e4aafd259f2c70af3861302 0x33835f1c2a1eaf052bcfb08a75bfc9ef59f6922c 0xac335696f6c386a75432185824c265ae0f3d8cdf 0xdb0a22a190ea9a5b8bf40442cbd880db7dfacb23 0xc0d503ff8462f61fd79ad1bf9a504310a7f896db 0xbed17694375eef813c649171852a9ecb767d978b 0x61cdf08cb057e081da13a56933bdba1ea45e526c 0x74dfad289d6c66627968ae34de890d0942194915 0x56ce28db8a0e9aaabe47cda86a93d4fe1a384c4a 0x826d8ecd5e9ec46a63f1b0a2da7a8929a8590c29 0x3405c271dad3e237afd270b321e5ea0d6f4b0003 0x591bd632cdb30284087ac627154304d3a618cd44 0x34218665368f1442293de030af0150b0d658c3c4 0xaa44fe52501f86284c73abddcad9c88d01a8edd4 0xd42a0f856a8708cc583982ab563c6a3d3c7c8340 0x2d4eb7020bfedcd696b23264884b858fee7f1556 0xa88c5389a81f2a14a0ff55911959ea965dd8ab61
