ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C3333B6CC7DB
|
Infrastructure Scan
ADDRESS: 0xeb991836c4323c2006f27b6a9bda000e53f37e64
DEPLOYED: 2026-04-30 20:56:59
LAST_TX: 2026-04-30 21:56:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Synchronizing with block height 27498. [FETCH] Bytecode size: 9653 bytes. [SCAN] Mapping ownership-protected functions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Checking for ‚Dirty High Bits‘ in address casting. [SIM] Fuzzing input data for 87 iterations. [TRACE] Call sequence: 1634 -> 96b8 -> 1066. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‚0x4215c9fe2a0da0aa92b399205d401932cff6ca76‘, ‚0x‘ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7c3e832ad3317b669086b9f6bdbcc4258fc59342 0xed7a6f5d8d0581eadc9fdd309f1ab73efed0899b 0x51c4b0ca080a00889e5648d39adab3f827dc8052 0x23eacfa8540e9fd5948a4b16d3e13755dcb69c56 0x1a6674a54479357603a12dde146758fd9d1bb5f4 0x889b18ffb70871b4ec96fe4435cf9b0639ca3743 0xa389774c1ac4d3452340b3d9fec310dfc3b2c28a 0x653af6440720903bb12d70e3a0eedeae4014b751 0x26ae75abbfa60a7447a0473bd80b669d61e91a01 0x96debe0d7f1791406b16b2b1e962618017a296d2 0x92aaf38c0d954c0ecb254f8dde2c43bc823caf7e 0xe38e2e3b4d9aef4556e62e4d2b1e6fc155bcc985 0x98a0b21ac3544f968ff212cc381b0311376278b3 0x15fc9cad78a3fe438d436701850d66f26328846c 0xe42a4b42a72c870728afa874c3c9f60ed4909b72 0xdcbc14754ec42ce88617b51213f8e32774f61834 0x5cad6bf583d57921889a511bd948b7348ba9dc98 0x9abc7f90044c06e9d3c68888f7fb4916e34acc3b 0x8328114be13f5761a4eaf2c1afe728f3b74449e0 0x68a6707f36a44eb93893e0f0e6e0696a9a7edaf0