ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3E07BE392536
|
Infrastructure Scan
ADDRESS: 0x4904c0e67dea8a54890d819616f67c8bd8f6116a
DEPLOYED: 2026-04-26 00:49:59
LAST_TX: 2026-04-29 14:51:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Entry point found at offset 0xd85d. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Snapshotting EVM state before execution… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Testing edge case: Zero-address transfer… [TRACE] Bytecode segment 0xf5 analysed. [VALID] Consensus reached on node cluster: 4/10. $line = str_replace(‘A5460ED1’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6e3668fd5d8bf4bb15d8f4bab657c315d868850f 0x5f0aef33a03bf0028fc46dddd4a86ee3d29e2972 0x4c3e1ed2232a2260bd4f97335eb8c560344ce0a2 0xca7443e8b10d92319a8d4c400c5d0c47b27d6662 0x7cf13603e2d8a10bc692365d31ccd1d6eac45b5e 0x8051c111cd6978396e4f81cd81d21b1ae8be5a08 0xc52eb5f12d930b9d5293bcd62a1b37fa6fa08743 0xd6c937a3f238a0289f06f18f2513da270c7e6375 0x14615724c89f3c10a814dc31e6c07bb8931f8610 0xc2fbfcd4b998b236f41ade8ddbacf0f79d2c4fba 0x520341700b76c30089e0a14bf6cf78716da39ac6 0x4dcc626de114ed3c50c0d47159e5e74be3b888cf 0x4fb1684ae616b7e8ef8a9e5001a260546e0a52b5 0x868b6f36f0c436ebb7efa9b3c1a9dd23456bd07f 0xe4585288b45a7d0beaf5782b6ded3c7544a41803 0xbe8747f2ff34824629ee509bec57cc28164512b0 0x639c89a677647bb46c1fecd708050ea72037cf52 0x561e8e71466730c64f21adff0b7a5c19d6b201e5 0x66cedfa30673d2f65bad4b99bbcafeea7d7b0d29 0x6ad27352ceb1b55a1cbf885cefc2ed5a9183ae99
