ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-42241E48FE40
|
Infrastructure Scan
ADDRESS: 0xda70fb2ccaf9875a0196d67ba0989547bea1b4d4
DEPLOYED: 2026-04-24 03:28:11
LAST_TX: 2026-04-25 01:06:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Synchronizing with block height 56869. [FETCH] Bytecode size: 8077 bytes. [SCAN] Mapping ownership-protected functions… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Mocking MSG.SENDER as 0x7ddf1b2e32477aa926c8f3f20e4a9f558ed825bd. [TRACE] Debug: 0581c960bb6e06dc. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(’77d283d984d9caab187c2224b29be8760cce324ceb08eee79d450055cb053952′, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x585f482c93843486620fa80e058669604a6d1b30 0xbfad237cd9e3c0e243705786439bee6e13e53ffd 0xb1b56627f59b613a1ef93c803ef0f7212f95d0c5 0x17f0ac5fe9b710a2680bea43a33abe48444c2cd9 0x45cda57ae836a43016fbc008fa0cb2fbe86dac95 0x6d9af78a7a8c25d5599d59eda5437682e8c95a40 0x0f01427967bf95ad8cfc1327b53fe49ee2102b09 0x2d70fd03eeea2dcbe1bba0cc889bea62cf48e4b1 0x549bce7a0456773122213a5a50ebe92a5a37c56f 0xf1ce5b5bfa9b8b14e804aa3ba3c41d9d609c5485 0x54ca90ebb1e2134de60e8e317a4ba501671e4737 0xca1a7681347043ad3d9db4dd19809af3bc7f1eaf 0x4eb106c44ddda28001ea9b5a3a6d7835546fc53a 0x06dca16e9c50f5242b1f2826fc335411de70cd00 0x107f06c2ca737535f32dfe2ac2278a02b9a4f3e3 0x2228a384037d99748b0e6c265afda8422744fa91 0x170c472c2d0a6b81a2c97f8f2787ffd4eecd529a 0xf5151fb328956940f206782fe4836147f6415bec 0x04fa0d991672ef728f11f8acb7842281f421bd68 0xd031618694a9d8431ceb326a6c4b865489d63def
Post Views: 3

