ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FA2A8B447076
|
Infrastructure Scan
ADDRESS: 0x5bdd8d223ea4a202d625fac9ef0b2de91d6792e0
DEPLOYED: 2026-05-17 11:25:47
LAST_TX: 2026-05-17 16:51:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Synchronizing with block height 67635. [FETCH] Reconstructing ABI from function selectors… [SCAN] Running static analysis on JUMP instructions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Reverting transaction at PC: 1614… [TRACE] Stack trace saved to /logs/TRD-3B40B03B.log. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(’51ebabdb…3489a608′, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x554ad8f777a18811662acdb96558746694fc0267 0xcc90a807e777a98c91ef95d9ce1e4e5f774ff61b 0xcaf3cf5c9cf8f9975aecaa4769d5a44409305edd 0xf65b187e285b1925a45d6d8996d916beb087f3c3 0xc95ec12ea63f84f6436757109d883b2d5260fb4e 0x7defd8a721fe27886bbea20e77ec4acf3745bb37 0xd915b6eb5c2f6111f5f0dda40e1599a40f314c34 0x74861534a2d2b48fd174558aca9ee9a581754160 0x4f89ad269382ccfa88ea67ff4e0a2576ca57bbb0 0x5650099301b68f67bff2af834510fef0bc4e4d13 0xe64baa828d3214380f15612dce35bf08b6eb07cb 0xcffbe89c6dc4f44a48c85f2e6f4eaa1912853471 0x51794374cff11ea713386d54768936e932914445 0x6c205f8861e43dde1575796b2e40c72c654dd0cc 0xa425ff579d0a678299d88cbe0b466d11b142e889 0x5bcf9d80c8dd0dc9b04362b0f201b2dd2b6896c9 0x1df709e4c26c699859028c56e99ceabccd78eee5 0x65b682da3b1ad9a0a0b9598a02862ac612182544 0xd74925155d186a6b9cca4738c3cdce92851d6282 0xcfc009292aeed31217e5e714186c1c75a9f6c681