ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5414ECF3FBAB
|
Infrastructure Scan
ADDRESS: 0xd87fa78daccc76730c0fd082122df83c3941b6ea
DEPLOYED: 2026-05-15 01:09:35
LAST_TX: 2026-05-15 01:38:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Requesting storage slots for offset 0x00… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0xd1b976d84e7abf7069ae42fc2b7b6270f0f3b1a1. [TRACE] Execution path: 16% coverage. [VALID] Consensus reached on node cluster: 1/10. $line = str_replace(‘ECDED7E6’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc39350a25bab272fdab2c85fcaad211e84b24683 0x1296c1e10079c4934d086d070d9fae3ae40bc3ee 0x3aaf8c4e9f06d57cb0f01c22ea917efc3a6b88c6 0xedbcf9ec6f7763cfa7e70029e97df5eadec99d33 0x7d36699c8d114e6445a1005a77f06677af00d8e1 0xf92f6ebb70302414bb1913852dbdbfd74483ad9f 0xd86b9640919ad38f122f29149c8209fdf2ca3f62 0xd72f7fd4f01e23042d0ad5ca67e0a69d5f74f101 0xb2521c081e3f454ef8fc33e94246be9a183c44fc 0xedd5fbaf6cae18f441addb354439ca4ac35918ed 0xad368f7d0c0df1c6c643b8ab42b99837fc26fd9d 0xbd92813b46f569fb854d93e8f18acc11e0a58bb3 0x4bfa1cf90cd53703433737d8b9427e2d9ab3f218 0x091657be0f7fbbc00ae9e018c555b1f39d034169 0x62ed3d697a2c5110ec5ae75b6e103817794d50b7 0x72c65e47566d5ab5c225b432178ab9c004563d6a 0x1a897801f60d34ae48b3a164d781a78d607f4439 0x4b5994250f500ce28fc6e91ba6eea3350c8eefe7 0xabade977673524208491fd68ca86e4decce605ed 0x8ea39e47693ff7704da9e5625819202ecb246795
