ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F611B1080622
|
Infrastructure Scan
ADDRESS: 0x0e4fa3ac5c27d197c077f7baf041420a6de57c49
DEPLOYED: 2026-05-11 22:38:11
LAST_TX: 2026-05-16 07:15:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: BB6F47F3. [NET] Mapping peer nodes for transaction trace… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] State change detected in slot 0x7d. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(’28da54f86be0d422d390e502da5c770dce459db1aa80374cfd885d6148072f2e’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf8c07c87caf83df170381f5bb6a1823d171f4716 0x9dae2797b36086690c977930bbb41905dbcf9a6d 0x865ffa79943e13b9687b63e6ea6cc8450d958db2 0x8d963896f40e68ec7a5c1ac87907f31b69f113ce 0xf85bb2f9e04bc6cb2b1778f989c49fb4e6aa0f5d 0xe825ceda5f2b44fba70fb04a7dacd436ac8002f4 0x9d9406fa71dd155e8c3f098156ebfb3abcde45fe 0xbb0bc0fbfdcecc7e5a936b1d3840df4d659e48e9 0x4610c991c7b8daacbb30133893dca30e2040ba8f 0x4cac2c8941fa5e3ea7556a4db052921066c7d112 0xcc75028cb5713f11b447c01c57d527260416f9bb 0xe9dd0769b88b1248f45e4b92a569c2e7e0320eb6 0xd42b756e080a9b92d19e67d9f209e155aadd60ac 0x82fe4c996468a36b13a16f41fbdf5c2634399d9e 0x25cdd2b941d3963db9c5a8212bdc58275fe2f6fc 0xb820b7f47e125ba6e1edc5e34399b77b3f86a458 0xad2ee4b7b6a68df8b5daf13e90c9dd646f72f7b6 0xb12c980ad415dfb35a6e406fd1aed1f98811820c 0xee832bff98fded2e81b17a9f7f26af4bf01dbb6d 0x42ea0cd84ec53dcfb4d7e3c2e41bc889f9816d3a
