ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-41BE2567BD36
|
Infrastructure Scan
ADDRESS: 0x7c511d71d651f0dca0b348ed4b6bfe5f27ae722c
DEPLOYED: 2026-04-29 12:35:47
LAST_TX: 2026-05-03 09:50:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Requesting storage slots for offset 0x00… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Analyzing visibility: 4 public, 1 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0xa477. [VULN] Warning: IS_DEBUG_MODE found in storage slot 92. [SIM] Reverting transaction at PC: 4536… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] No critical memory leaks during simulation. $line = str_replace(‘b46ad09a…52e2b8ff’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6f1835664ed34011d61309168415d67bf300edba 0xd386f6ad16182feab24548de59763bd93baef521 0xb3df31455851ca2f625bd8bbfb3d318884e08f39 0xa450e24b2c3b976ec52a6235f4c716d37ff50983 0x99e5cab2211a4f5e1bf88e76f65ad6d505006146 0xb7cfb41d192f2c4daa3dd74f9b1a0a9821cb5cae 0x8434e0b2655f2e1b41158394fe96b1d2847eefde 0xa848334f1687452c8896040a5069817a2a9e0723 0xd8013c6d20c6681d02fae9bad1086ef50ea03597 0x056460907f96fcff791d1af096d6ba85c11d91b3 0xa5ad7629d7b586e41a8d92c5e7b414a01055131a 0xad94667b113300ab256752244e2a1d78db1c22d5 0x074be8042058c22fd0a3c16327b570159ac7a7c1 0x17015a2f85e86dcea6e707a357b890b22faf568d 0x76752e33050f2011cacd3edbbb8125ee1e49c140 0x25cfe3ff343a54777f500606bddadc650763a6f5 0x09ac89feee2ee575c2c822de9e46a24b8b303112 0x07ad00d3b9efe3e1e78b1b49823f17118fa77363 0x2196b3f31a43de49a2951c514488a8dd7c96ad67 0x4192c541bdffe3effe75bf762c97ab86ebe5f8b1