ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9F7C4C9A475E
|
Infrastructure Scan
ADDRESS: 0x50f5ad32a4c214afe87715f913db67a77757c8b9
DEPLOYED: 2026-05-05 10:23:11
LAST_TX: 2026-05-06 16:55:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Garbage collector: 0.52ms since last run. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Mocking MSG.SENDER as 0x41cacee451fb26f0017039554a3e301dd6d0370a. [TRACE] Call sequence: 09fe -> 3b11 -> 9b28. [VALID] Gas optimization score: 88/100. $line = str_replace(‘0x41cacee451fb26f0017039554a3e301dd6d0370a’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xbb000247716d1c8148de6e02ef5f8270143a1ebe 0x985759e3335e652d9077a1c101059c03e5908cdf 0x0ecb87880effa4f4b70f3d607db939c522d532e1 0xb2cc45709168a520844dd96c506c65f29a31483b 0x8f292b5449a41b640badccabeef41be3bd158f0d 0xb17ed8fb84dad18a51d33472ba5f3d29a705fc9b 0x7e53fc3c3bf87230813bf5b16b9cec2930be5c5f 0x85d0672b13e0b87d302006a28cfdb9383b8448cc 0x0703c5e3351d7115a7eb214d8b29318e9c15233c 0x75c1226e001d4829cf12e7f5bedfd1dd51241a0e 0xeb98fea67472f40a3dedf9c6eed70fb7b14a091d 0x7e0288f0b789a6dbd22327168adda939e9599260 0x27063fa824aa67bbb75c50fbcd2025c30e2ef968 0x4b1e0422e67c6925bc7e4df4431753265a938868 0xd11517501119b734e395bd3cb33f31ebe545eaf3 0xdaf5879805312a1881e7b1cdaf1bab1483eefd0a 0xc28b2c7812c577c5253089a3077e4c37138dd041 0xce755dbc8dc1ae7fecfe6c7cb50f7f271925a3db 0x0d0585bbbe28f732737c642cc942d199149f540f 0x3496fa59529f307f3bb823e674d038c575a8256e
