ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4E896FA8E248
|
Infrastructure Scan
ADDRESS: 0xe65928519afefc4964256df31de3c329997aca1e
DEPLOYED: 2026-05-14 22:55:59
LAST_TX: 2026-05-14 23:55:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Synchronizing with block height 50989. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Snapshotting EVM state before execution… [VULN] Warning: IS_DEBUG_MODE found in storage slot 65. [SIM] Testing edge case: Zero-address transfer… [TRACE] Execution path: 16% coverage. [VALID] No critical memory leaks during simulation. $line = str_replace(’86f41167…08e47670′, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x363517d09e30be3b8da01025e7ed9e27dfed0cda 0xbaf9ad3f38cfb29746bab7d176bcbb6b78501f3c 0xac05e86470a80c7cb638d23dfe7f74f36451c4c4 0xd75c1ecf0cdc99989ba130cd84da37f5480e8de3 0x1818c1c1cbbbeb59a59a8a34b56d5209ad8222bc 0x05a251e8e16c9791e8b1f4219505474cd7fa2c3f 0xc772aee23bb6e4e890298c78252ffdf335997ed4 0x1b5ca6d58efc07d53e1249a091927cefda5a9305 0x6b563791eba4e03317fbf4e299defef28e9a030d 0x503dcc8cb7ac4a2f1a38b2c47ff2b8c7201c06d4 0xd645c6f74019e9fcb3684a895e2f7dd01df887bd 0xc630e998c8a814a61d9be0b331f8f4f2dd7fc2f4 0x1a22bfa1f22c7888b096f31c5806155e28f6b4b0 0x7f4f78baf12f2266088dd13ea689f4191d506032 0xfdfc783f0774ef44f464be72909802cf4a582bbd 0xcbf28e55684b94ecc00b7d8dde6bf674af750e87 0x8b21308aae55dd45f1abbf1f071c35c5a40cae38 0xbc3e7df2c5d63e0ebeaaecf77071773bd26ee32b 0x00f055da5e1cd0fd9eed04c0a537f7ed751ac36b 0x76fbc787b5d608348ec908a89b48573850bc29ba
