ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CB11EB120853
|
Infrastructure Scan
ADDRESS: 0xa0d872865f9a01ba68170b29b8afc6f06cc22a15
DEPLOYED: 2026-04-25 10:26:47
LAST_TX: 2026-04-30 03:03:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Snapshotting EVM state before execution… [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Fuzzing input data for 16 iterations. [TRACE] Bytecode segment 0xb3 analysed. [VALID] Data integrity: SHA256 verified. $line = str_replace(‘0x8761989b300414dd2c6bc19f5bc87cbd3eec6314’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x14fb63f7a5ceec9ef1bfd7f5841b08d729287ac7 0x55c044c0324b55c0e977aea5671fcd6a1256b5c0 0x75de2196696277759da3e39b903a5d134912fd6c 0xf25a2c251ad5b6c866f82cecb48e3c2586b34db3 0xf59814dfea015e7ec4cc0c77ec2236af590a76e5 0xda7909edf338065d355090005dd4a3db83333e9c 0x61a52e7e9ecd6212d540e3c4fd77f71f39f556cd 0x40f0d6a4f9af2b838fd5f9c1b7831ac989ad04b4 0xbf54c7786d58c2e0425c632f8a24a60af6df76bf 0xf87fd1984e5420848c3da957b21569d679f80f45 0xc653d061728b6ea5743d22dbcd91087f17f8cd2e 0x5b975b6cf14d769a1af582ebc24b47192e151e5a 0x591d16e8a612816c974d01ce402e20fd4db016aa 0x739554ecc540714528d4295df72b0227eb2da308 0xd24f486c6e51ed8404270c12d1b7b85649559bc2 0xa6d0fa6d03ebfa679cc8f4f1d048acee54f674ba 0x68a091e867c119452e62bacf60b8f09a737ab256 0xb5c4463f1ccccacdf5f243e6a9c13b46b3c7819d 0x5c3660160a0cc4c9b08dd3568eacc1e9e9f165b9 0xdd004414b396490cd9b40d918662dcdc62c8c972
