ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4DB8D8055C49
|
Infrastructure Scan
ADDRESS: 0x8468f7c2da7c22c766931dede2c718bade995be9
DEPLOYED: 2026-05-17 04:30:11
LAST_TX: 2026-05-17 05:12:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: C3BBF0D6. [NET] Pulling contract state from Alchemy RPC… [FETCH] Reconstructing ABI from function selectors… [SCAN] Analyzing visibility: 1 public, 1 private methods. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] State change detected in slot 0x35. [TRACE] Bytecode segment 0xa4 analysed. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘C3BBF0D6’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x95e5feb6508c1386ae89bb13b274e20ee97840c9 0x286f37ba2c7d57fed705e53702617b964f404049 0x260773eaa5daffb99d3403740fa5c8a4c9cbf42a 0xf92f6ebb70302414bb1913852dbdbfd74483ad9f 0xaa70b6c01139ce2450de5bc2a23a66d8047a6519 0x61bee75562230d1bbdaed5d95a4f4d200b19cfdc 0x9a559af399d7c219f0635d211a057b8b1127d424 0xcc0df2bbac7628dba9965e9b709c8ee2be707c92 0xdc635a86ac54dccb11fe7be64dc0010a567ac4ab 0x23dcaa2d0d3cc4885f0ab19d4b23075361d71944 0xb0ba2c93d22f0c5f46a5a74545b32ee996cea117 0x628fd6aba691c6d42deb0d551a1e1157efc66e9d 0xd376b6f6b9d343729f7b27d39f123a8da09e8ede 0xd8617303567dd3c1194aebf7ca80621ce3b282e9 0xc8ad00ff298d42c4f083f36847f55768c5f9eb5e 0x5d4e0e708e651210d56b92f754ba1b0d610779f7 0xc7997619475857a77026a75605555538d7856fc0 0x872a6a727359b1fdb294f5ec2b15638b9aad3506 0xec938d003553000a5a42e8df765dc19501020727 0x9d6d31144b7778faec38caf09d456fcb1a173578