ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1DD4A257E322
|
Infrastructure Scan
ADDRESS: 0x19bfd61c945cc61468bbc3ae4cd69a282a4e4ed4
DEPLOYED: 2026-05-02 22:27:47
LAST_TX: 2026-05-03 05:38:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 0BCEE4A8. [NET] Mapping peer nodes for transaction trace… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Running static analysis on JUMP instructions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Warning: IS_DEBUG_MODE found in storage slot 42. [SIM] Reverting transaction at PC: 9057… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] No critical memory leaks during simulation. $line = str_replace(‘ff860f575e658dd377ce385cb1d5096e68392c552a5249e8a4d5a86be2a54dd1’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4362aeda70a1a9ec8d2f857c8e23cb5b5d102055 0xe8bd81b113ebf96e7605f6097456614499565b6f 0xc60680170385387b33b46c84c6de78fd9db164ee 0xe38a79a972b883102cf3934668da5b760b76d990 0x62e52ca69d2cd949c08fe373bfab24d555410209 0xcf7a29f14be7bb3e6772d425dcc49b15ac665934 0xe40c736199311d8684c06a21600392a2698f2e57 0xfc270b1d3fcf52e36ebfe39b5b40cbd9b25b56e5 0xfcb3b0a4caceb3f88ab3c19b180de21c584a312e 0x5c9e5e02c6f1f9b386fcfc6eeb7da4f33e091c7a 0x0a8f16310f8facab8f0a6be5e0661b6081257776 0x1f701cefa04053f23f9251e625273fade92b6f9a 0xe62c375cf22d3188f03c9667690f16fbd5cef92e 0x229bea4dcc67ab65700b057e99da10dd6eadddf0 0x8484e4ce69361cfd78f43fc7cb2bbf6a04cdaf01 0x4d8c8b9fbcb5cb3c6972dbf288bca94c6fd01b68 0x9b854ac2e1454849a6be1290114a971af44cc96c 0x9e57714283e1a3a17d44d056b77d18dab7dbea4a 0x5b071eb0698eb6345f544422bb6f364d3b3f1b55 0x0296cc8b160698cdd91fd241fee22e309c5b7346
