ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E948E7532DE1
|
Infrastructure Scan
ADDRESS: 0x8d4cb2e7b14f8998a3def19c32245702f53b9c14
DEPLOYED: 2026-04-29 04:01:47
LAST_TX: 2026-04-30 06:43:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Mapping internal logic flow and branching. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 90 iterations. [TRACE] Call sequence: 71b9 -> 5802 -> b2c7. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘CE5E316A’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5e7906f24736c5e773e244cb36a3a25ec199ff14 0x5f598a4b588766c41b0de5a93b91e03f00c60a77 0xadd3a7a0adf2df981b15ccdd63e7967371eacf1b 0x5abed571172552a73b964a79e9a7e866a9206e25 0xaf27e7d014861a2af2cc322ff7f1ed415ef519d9 0xa44b0869115a36291a7b3420431ecece17eb9293 0xdbcb77e17f801841766f187477190e2a53769223 0xd491956b9e498a8a54d037658f6f2beb6d0e71df 0x39ccd30a6c009cb2433e4a3738a840adc091f2a3 0x57ac094217e0e3887ab135de205b0a2bb170e87a 0xaeeea5cd4e71afa87f4a84374751298d5a4d3f4a 0xce750f9cc021ce602e38a4e284ddd9e9141b8937 0x2d278b1cd9101c82d842a52727e9dcf18db16d89 0x9722a01990fff91c0a1fcad7a8cb6b60c17c2117 0xeea6e6f12d2ad8080fcfb01902a5e92f81d450be 0x08fb66ef905ea5c40bf2162b19a42f96aea8d39d 0xe6d29aee20854eb80d1611198ba772f3033c1c21 0xb092dbc0a20b32084822efff9941ce5ddb93a212 0xde3c52f1b6409690af900fbcc48d90da4adcc214 0x52abb0966ee87dd5fa91b102b3c06e8673879a75
