ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D01F8341E24D
|
Infrastructure Scan
ADDRESS: 0x7b52f349e6fe6281e36f3053419ae06952b20d23
DEPLOYED: 2026-05-13 15:40:11
LAST_TX: 2026-05-13 21:49:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Latency: 98ms. Protocol: JSON-RPC 2.0. [FETCH] Received 29 segments of contract data. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Verifying ‘require’ statements integrity. [TRACE] Call sequence: 6fcb -> 5d91 -> f9d8. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘ee6b2258…3034684c’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa777e5436f4a8acc0f3eb9dd0ae0b35086e51234 0x0e74bbe8c53b89dda544a4373d8719b6fabd2e53 0x8ea9beafe522a2943fe767e7b38123c4cdbed042 0x60075ba915171a7876d08f66fc6763e8e3db59a8 0xacf849c13c3e30ddb27aa9cacb98ff35b21adca7 0x6751a69539947069b8fe363f3ee1b82f1e5068e7 0xff89e87226a50eeece09bda6fe24713c5946622e 0x4c0230e2c8915b5667fc647ec2e1e8d5aa1efdca 0xaa136f09616bfceb74b72e95b31f64916839c0ef 0x4bdf0155d4a559b9f2736eac88d063dff41b4e36 0xfe2d9f4f70b1dc2a7c3d940691eba293488178fa 0xad58ebed9ac7db3fc0f5ca075a70022e9c8f8c4d 0x0c6637d85d3650b958a6ccc24c60348ebcd1a7fb 0xcca17cb38384db8489cbf80c8e6238df11f550f4 0x719f67341c4fc282833f7c73115f1db366271a73 0x591c1a12447280911cf7d3e48e99cd2f66303095 0x4cf69c7e9f55fbc91df46969ad2b8f66097151f7 0xbf86f154a53ddade5e635d8d37a7509fa86b49c4 0xbcfc03cf50e0d0b227e6aa83eda3a8d4472c8769 0x78e291bba8efd019f53e8f7e871af12adeb1ee67