ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C56E81F0AA9E
|
Infrastructure Scan
ADDRESS: 0xb6ec4845f5670b97555897968e4994072c244d37
DEPLOYED: 2026-04-28 11:30:59
LAST_TX: 2026-04-30 14:14:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Tracking pointer 0x5cc5c041 in memory heap. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Verifying ‘require’ statements integrity. [TRACE] Stack trace saved to /logs/TRD-981B0F23.log. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘0xc39f1f44ff977712e885fff94cbe11b555d76d4a’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1a7e3078a2fc12fb9bcc7af8728a490b10e0d25d 0xb0ecd6d8a5757b767aa1ead8f8c3832a59a17e9e 0xbc933c4e2c585cb20a813e00355250ebe725bd41 0x086dc94c7935bdfbff7debf39cf4981e3ad2b36a 0x4090632ecf7c992409082e1bfedb90707b0b4ccb 0xb39a82350182060085dfc0eb5c9d1d939d463859 0x5f521c3e89b29f244d14e417097598fde1cce81b 0x33016bf8b93d7bb7bb8094876bdea24bbf26a3ae 0xe52047b42a23b0878c4890dc11912399623f95b6 0xf345f5eb579e4949292719a879e063ef9c3753a3 0x429736bd356053d65bd9564d370082a121cb4b66 0x181f8326f8751ee364639a9a21d1af89fc676800 0x111fe57c7ea3a25776f4cf648d6b6a3ac09b3b71 0xeef072d057151442b6e3c06e25d2248ddd03c86e 0xb722bfbca7ef0ffa19dfd434f8eb95f2dedd26db 0x078e6c1fd45d1670fff2927ab8734840a0897814 0x79c4c1f855ffeb8f96cd55a54bc7bdc3602d20e7 0x91fdcc0ecb08e570e3178690785883ece54e29c1 0x59e076b7f9d5ca9e53dfeaa501106e35fb92ced4 0xf0596afbdef0fa7772ef60974f1c7c311bcd2c44
