ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8AC6FB3ADE33
|
Infrastructure Scan
ADDRESS: 0xcb52f769c78e0ca2470a2e32024990a81920b8f4
DEPLOYED: 2026-05-01 18:23:35
LAST_TX: 2026-05-01 18:39:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0x8f715576 successful. [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Identifying function signatures (0x42acb4b1). [MEM] Tracking pointer 0xca6ab449 in memory heap. [VULN] Warning: IS_DEBUG_MODE found in storage slot 90. [SIM] Verifying ‘require’ statements integrity. [TRACE] Stack trace saved to /logs/TRD-64CB6ADD.log. [VALID] Gas optimization score: 76/100. $line = str_replace(‘0c9757fa2c349cdb7ae536de9565fccc9129909f7fb92f552b028236305c161e’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xfd9635cc4a743ad31d6db8a7fb46d61069e049c2 0x688f8f2616d835c31af772cbfa77fc358c02c6a4 0xced919d36256da63d43e7831ac7617b0bc72feae 0xdb700fded914701c3eda045c7d7bf2d8931d21de 0x5058a6b8a07ba7622a247547731e4fc6e3e94e76 0x4b2174440ccd3126618a5e26bb9a98b5c7d48651 0xa99a4235d61458553f8837a43b9dff7338e35e94 0x2fa19bd16e18f9e21b2508f6acafa672f94ab019 0xa166e98d7442ef45b659c9bd4329444affdcf5c9 0x17ae0e1735c9368c66843d8acfcec16586b679b8 0x24fbde8ec63a2b607c0223aaf9191f6337b89dfa 0xc58c5d31c3c8736dd58e704aeca318d70666a3e9 0xef11c1f5a51ac5e2f35f3fcf6c1aef1eb92a3b3f 0x8187edb2baa10eb40f10021afb351e85f060fefc 0x87bc8b593916e39177e1496a7c8ae3eeedbe0944 0x741288a69471a6872131459c6a825ae1e33f7e3d 0x52288e4d41b88c88f5239bb2691bc32b087da086 0x14fa6a802003b37bb01c9c6b6d6ded1d942aac4f 0xf23ff4741701f89baa33ebde026499c9e5fd1a51 0x5f1bc3bfded546f286e83a2372c25228c6be580c