ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-443B66EB44DF
|
Infrastructure Scan
ADDRESS: 0x756d338f485d6da08e1cad9e8dd3ea356a7ad22a
DEPLOYED: 2026-04-23 23:02:47
LAST_TX: 2026-04-30 02:01:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Warning: IS_DEBUG_MODE found in storage slot 80. [SIM] Verifying ‘require’ statements integrity. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘D2DCA97F’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe5975a76755cce469108c1c657e472a0b372b456 0xd6826d0759debfc54cf264b5378187fec53a4bc0 0xcb6a766fc25f80e904259c1d6481d7db8be14db3 0x97a1e160594cd8aeb77e1bc440890ff7680c89c0 0x51c60a320b09f41d78c2c4a1676942a21a3a8612 0x8599c7665f4f8cb6ed2e80fbcb91ca57aefa437c 0xd06d4aee6f0d773096e6b68c2912c23f59d8ba78 0x2552a4a6188dcdae553ab1ea78baab834af011b3 0x22bd1ec767e21158f1917ec0f5815d8ddca04bcb 0xb57d33a47d201b69b7db1c8e8f3b3b3d2bc68372 0x8a5d3958db2c2be9173a180759afc544575b346c 0xe42b22abf50b5c1b808d380de4544950d2033048 0x5f22cc5909e786d502ca1bb1c17ad02e92828090 0x0f4d2605f6ba3ed221da43848b606e341ff0fc64 0x73ca8291a3f371687d4a29062385d4bf04dedf58 0x4ee54b991dfd3e19ac736434ff2f12d3aaaf3934 0xd5e84ead94c960f1c10867698b720b8bc5258dcb 0x908e0d198125f67d1941995bb343ca9a78f11d4c 0x3abb55ff347f14b8ab141006ca839847787313b7 0x775826ccff066290cf75c9119a652a854e598382