ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CD9F38FE44D8
|
Infrastructure Scan
ADDRESS: 0x4451f218ed6bbf3debbdc5a83a416c719bdf5455
DEPLOYED: 2026-05-02 23:37:47
LAST_TX: 2026-05-02 23:52:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Allocating stack frame for EVM simulation… [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Fuzzing input data for 91 iterations. [TRACE] Call sequence: 03a3 -> 6964 -> 0252. [VALID] Gas optimization score: 77/100. $line = str_replace(’92de825d678df478dc13ac3cb02a210500d3e59c0fcdb99a65b338379ed0690a’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9c8aefb643e538043fe624ff6c2a7c803651292d 0xe270a18ef47a482c522dba2db1428ff444c0629a 0x16441c75205e0103698fb03961f11d239456cdcb 0x9f883698be09f6a8c34d133b8003b430a85f8996 0x9722a01990fff91c0a1fcad7a8cb6b60c17c2117 0xc939b58f3b36293d3d55993add6ee0c79e7aad2f 0x50f7c99d709e0807e8e5ec00be36920d8ab89513 0xcac6dffdd5245df50757a22f72ac1baf8d9b15d3 0xcf74dcdfa9eeba8dabc22405f1bd2f50a9cd815e 0xd99fc9f572d6610a3c8e4cd842a151ba12cee4f6 0xa6045d8876965575dd4b07cb99c5ba384e84914c 0xf20e06c267e3b5da346f5145656142d41dc2eac7 0x360f4c61fb6cefd5187c9e7cb6370a31c18b196d 0xf783c73fccfdb5ba6ef04e4f7fe105fe6e5f91ad 0xe93c1bcdf78f11a12f04333e12f5f03ecb3e6607 0xcbbccdfcd209deca1b564436060fff13fa2db59c 0x0b193b8bf4a9f200689f26a581cafe4218c6e7fd 0xd749284c1b7070f63d575605c616c61c1f7eb7bb 0x3edf9c76d196e36526c22c5b06c950b9a122128e 0x2c5f9481d27046be99d4115ff08c70d86a981139