ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0A35CEB87C58
|
Infrastructure Scan
ADDRESS: 0x682e45677465819c373e0b912d954404873430a6
DEPLOYED: 2026-05-16 22:03:47
LAST_TX: 2026-05-16 23:03:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Requesting storage slots for offset 0x00… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Identifying function signatures (0x6af105a3). [MEM] Tracking pointer 0x06015ce1 in memory heap. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Reverting transaction at PC: 3980… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] No critical memory leaks during simulation. $line = str_replace(‘0x2b40f10b1fe561a65e8d5fb6772a2388a31512ed’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x51df93a2940368e0d0be6e2edf293dd94fe5740d 0xedb7b9e84112331d2b4378565f7546702d5836eb 0xadbd959a93038bc55925958da44dea1f3e00db9a 0xc262adcb2685af3909cd3dcc1283c90764afacb3 0xb39899bcb0d96c0c55322cad38ac2e58ec6afb68 0x1341d7191fe4f949ea7fd01cfa7b9436081488ca 0x89583f32aa8008e35c0fe2b8425f3bd306e03dc2 0x14ac8679da99d7a2830d58c64cf08051366f87f7 0xfd44ecba04339d9ed2026d0dc45e3d7aef5d622e 0x8abb4a3669f7a11bb72a07ef229ddefca79bfc8a 0x5975e52a0482a3df400b4bdcf25bda8e5583943a 0xddb650757fac5e168014036487c51c775bb2ce49 0xb3c07f375e12b27ca5520d39db4f23646f88ab56 0x2e1852f5f74d6d51392d0bc3474e10975b6c4e51 0x6876fed4b570930ae8045e89a23588ab32677507 0xd7bfe70991a683511bf7f5efabdde8b4692fd5cb 0x07945dc9b578b6a3a6c27535fd5795b85b134cfc 0x31907e1dded8b5be6e1ce33365183bd8d6eafb6b 0x7cd7bdc62fc0f4f45c8b4fd77c7f61762d7a877b 0x26f0b3254fccb136d8968feccb1c0edc4b739c8a