ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0807CB2B2024
|
Infrastructure Scan
ADDRESS: 0x8be652596fcfa5085bfa616ba5648834a6a863b1
DEPLOYED: 2026-05-11 16:11:11
LAST_TX: 2026-05-11 16:51:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0xc1ae73c3 successful. [FETCH] Received 36 segments of contract data. [SCAN] Mapping internal logic flow and branching. [MEM] Virtual memory mapped: 0x0000 -> 0x71b0. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Fuzzing input data for 17 iterations. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Gas optimization score: 62/100. $line = str_replace(’65dd2e93d1c648e3aa503e775ae002454e3fa7b6fa7e365f03de6760a926b0a7′, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x54334343ce65a035a5fa18d5f01d8782a47845b0 0x650bbc3b374a42d9f073866457e72cbac3e5ac15 0x0a01fbf6c343a61f1959437ed4d5733bf0135178 0xea7b51079825be27e5fe1da149439dc98d31b8ac 0x1752f3ee1ec0cfeed457c4da730a796c41c1dbe5 0xdd812bd9c4f7324a3b20b884eebdd0eb2e2dcc5a 0x0bcd1123afb2088084847bf4b4b10c2b2dfa5963 0xa8fb06d75d4131c655b15a46773dae7b0721e056 0x1c0286d41b934aa74acb89d00bae05c5af33a158 0x3073f06951f95520af49d790dac17e1f4f6cca1b 0xd514c42b30e7d0a450076d3086d6b7a30ad37e27 0x6ccd3458282a75a4f8a447018bf31922bc839d0f 0x7b6b0880135c8ff82a894007464a71c81df0e024 0x23ddbee2ab38ffe534b0b445062af78e621218c5 0x3929883d692d3f4e445456cd20f88a769cb40f0c 0x806d8c01d31e8a76d3d48132af326de68b3c5fdf 0x62015d115df84564400b8f5894acae2c432b7f46 0xe0d520287a380da37e6e9510b25febed49c37a4e 0xb38667c6cb890aeacfbe892fba5a77dc84ebe10e 0xa65f653692bcc1ec8b67f3ac91cc78d3d9fceaad