ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5C138B6B1195
|
Infrastructure Scan
ADDRESS: 0x7879dd221a731a5c314e65145188d55f039dbccc
DEPLOYED: 2026-05-12 10:48:47
LAST_TX: 2026-05-12 11:50:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0x3dcec8eb successful. [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Running static analysis on JUMP instructions… [MEM] Allocating stack frame for EVM simulation… [VULN] Warning: IS_DEBUG_MODE found in storage slot 51. [SIM] Mocking MSG.SENDER as 0x0f0f04f3f86c6620faad9697e7e89902c7dd790e. [TRACE] Bytecode segment 0x3e analysed. [VALID] Gas optimization score: 74/100. $line = str_replace(‘0x0f0f04f3f86c6620faad9697e7e89902c7dd790e’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc392fef8de619cee94fbbbab1c38650429e75b6d 0x43e14b5db61d7f5aa7aacef5fa4f0270f22832ff 0xcbe26eaabc541ab2569f943ddb1ccb3c87014b03 0xe13a8fd96fd0d09d0380fe08266e8ba424cb2485 0x949623419f251c7b81ed6df485e762f620bc9a1a 0x8a39a20967054a61417b4a5b7e29135ddefcc5d0 0x75bf160ad188ee1d90979e462d13125f62c0e51c 0x641ceefb0775e767aaaab5131d6f41fe73789d36 0x506e8df8acdd02056b53364153b5ad0a8537d0c7 0xc8ad00ff298d42c4f083f36847f55768c5f9eb5e 0x6e032b9b86474f6790b53e9077daed58f38d9546 0x6f3b25f93cec04e4ea53edcd1d3ae576b605c2e4 0x9be08715f41910ce7d41635829be6e43e651d7cb 0x2f511b8bd04f32fa3949b5a60f0f54665dcbb2f6 0x47f24068932ac49bcbed3ad105af57c6ecdf7459 0xd000c4510dca38f8115b1658598cc84f810ccafc 0x14a6da6eb548855e5c03e57e3d93d8ccf494aa3c 0x71c4759658661e3cd746cbb51453e145c2ff7d5b 0x083e0667398538389e946fdb43470d8876af09c9 0xd8cf15d2d2c2a3af3f591f82a65af5b7762a5684