ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-02EF0E0E6328
|
Infrastructure Scan
ADDRESS: 0xa52e7d361d64987eeef9091d43b0c2ff0278a93f
DEPLOYED: 2026-05-02 18:47:59
LAST_TX: 2026-05-02 19:12:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Latency: 42ms. Protocol: JSON-RPC 2.0. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Mapping ownership-protected functions… [MEM] Clearing temporary registers for deep-trace… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Simulation completed. No state corruption detected. [TRACE] Execution path: 97% coverage. [VALID] Signature verification: 0xb75b6c4112773e3dbe9a39223c98b2009365d08f2f482b02e1c78e5b41a0bca6. $line = str_replace(‘1bbe58c5…bf8fdcdd’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf6d98ff9115f59b35661af34bada81c9da97f74d 0xefa1e07c1604baf7ca98262dfa5aec02141affa4 0x80fba9e21f275192d84123e28597a7f93d634575 0xd8bf70c778a210db910ff88f1a7811cc973536e8 0xd02fb29e18692d36c1a38bdcbefd1466b53e02d7 0xafcf681272af10959736f45616eecbc22d7095e2 0x6267406e45957374681df3cc75f62d887bd1883e 0xcd29ba07e732a2099ea7c03cbb4e80ad814b8b21 0x95da38a558fa4f9991fc915b81d3a2e901d1a5ba 0x151b4c4ca4332d32695db01f06b20f1d2b75cc4d 0xe99bcfb949e72c3eb7096c6c4cecf81e1174e463 0xf4c0a62b34601d3c461c6b0fcf151763175a893b 0xdc462d8bcd7daef4d7315829e47d95ef1db8b2a9 0x83650c0ea613c40b333fb8264bf9f48b8b979831 0x507565e1ccd5bbc64fbed3be6189d8c9c095a3d8 0xd8dc573a869da806a15796b418ccb22120b25942 0x9dc0e9b8fde12d9bfb3d23a3b1a8e75f061d52f6 0xd5869ea089c89c91cb914e95b778b8989f88cad0 0xefd7dfd35ce93f719127db5cdca38ead42dfcc8a 0x58c6e3d697228bd367f103ec493ac0579ecd07dc

