ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F27EC4A2E7AE
|
Infrastructure Scan
ADDRESS: 0x4458d1894bc15754caf3cdad66bfdf41794b618a
DEPLOYED: 2026-05-14 19:27:35
LAST_TX: 2026-05-15 00:46:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
â—ˆ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 74. [FETCH] Reconstructing ABI from function selectors… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Virtual memory mapped: 0x0000 -> 0xb5ba. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Simulation completed. No state corruption detected. [TRACE] Bytecode segment 0x21 analysed. [VALID] No critical memory leaks during simulation. $line = str_replace(‘4799E1FF’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa104d7389c18558225fb89722855ce04fe911af1 0x99f22f81381c847d2d19f8a7b909d533624f6306 0x4fdabe6a0160f4cb8b5e75164ab4e928d659e0a3 0xdc4be7aeb107b911b2ceb896a5dbb3c37cea540e 0xcd90e0cddbfd8c5b474d6bde2848188e5df64717 0x1cb931b20b75ac3ac4ec070499cd6c2ebbc40514 0xdd029368cf06eee2b4c0ea7ab2866e59decbd10f 0x265baf8119deb1a811c2650fabc203c0c557d8f0 0xfd2cf757ef6bdd79e76fe3b802db2e8213638b17 0xd91f0c4527112daed37d6be1b988ca796073f9b4 0x7dbe33959f85d02501d735b032b5b4a6d06f6b45 0xd026bcc53e655a02cd5628a6f2b7b50a8f95b425 0xee2292985d73ac30ba16ea5f4bb23948e42839d9 0x274433e5bfa2dba50397759642d1180142ae5dc7 0xd6f811955ff89eb14b0e0d5f058a8b30d0bf4781 0x719f67341c4fc282833f7c73115f1db366271a73 0x237e7343185e51d0baf334c87005d0d5bafdc701 0x399e66281c47eba2e5659968c3a0302fb85a0ade 0xce8e4fe71d8aed93b4893e582c34336c0f436e96 0x1470ad9abf379d1854fd01a8570aed287f4a9bbf

