ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B27E099AF9D7
|
Infrastructure Scan
ADDRESS: 0x422b966f89406ddee5dca1de55525a989f814903
DEPLOYED: 2026-05-01 16:57:59
LAST_TX: 2026-05-01 17:50:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0xc0b523c7 successful. [FETCH] Reconstructing ABI from function selectors… [SCAN] Detecting compiler version: v0.8.58. [MEM] Initializing storage slot tracker… [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Simulation completed. No state corruption detected. [TRACE] Stack trace saved to /logs/TRD-47E6A125.log. [VALID] Data integrity: SHA256 verified. $line = str_replace(‘3f30c106…7342cd5a’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3e680373ea0f58df8f030064b7500c0293057610 0x0f562048e189766af5304cf1aa34451229e97baa 0x43da34711b18fa5ebcc422fae4e7528ed1f3d4b2 0x06ff6b13108bb2a1e7d60708b0e40a0bb55993c8 0x138303f0c118c3c240bac04617dac6fe891678db 0xc406c5002c75f5c182aee925809ee564ba871016 0x5df152c34449252e50788dc2da7f16b72910bf03 0xcabb37a4e82d22c75d2e661cabf2b1ddae50a54b 0xc23804e1e6275bea6ed2faf26c78d0d7bad92c4e 0xc26d2fbffcafbbdf50b804cec67df12ee996108d 0x4f0f218b813d96527b3e3e925f9449b9bd28afbf 0xa874bf6215a4ca1030dc976ea2039059182187c9 0xf2de31e55deefb1cd3be8ab0097b37fe78ccd266 0x53873d3d9442b869b8c0947ee1d6b72744672eb2 0x6f55fb685b4daa91cc46b39c7a4683a17424f3f0 0x4d3a0bdfc045e40de4a0bad3082a5bbfdc52c77c 0xa5ec582e4f16cdb061d1569624615fb337204bd0 0x3f05817d189e42def51bcf5cc56926008eaaca60 0x1af84a8849a6db09c02cc56405b6e640450c935e 0x275bd177b290c0fc67751b2a8f3b5a633fcdd8ae
