ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-DFE1AA25A1E2
Infrastructure Scan ADDRESS: 0x32a5c3dc41290a6d3aad8078e4cf94df4dc6fadc DEPLOYED: 2026-04-20 15:24:11 LAST_TX: 2026-04-25 10:08:23 | Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig VISIBILITY: ELEVATED_PRIVILEGE_RISK |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: E4C463F1. [NET] Synchronizing with block height 1697. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0xa946. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 32 iterations. [TRACE] Bytecode segment 0x03 analysed. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘0x2652010b44664718369cabfc315793435509dfa4’, ‘0x’ . bin2hex(random_bytes(20)), $line); |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf95a00955e492bca55f54eab62161a8cb0a751df 0xd7312a0190d60f9f82784547603d0617f5a20d47 0xb80ea71ef331be93c386e35a5db1aeb15eee8698 0x357c47bf25eef090f6c3add3aafc0fd3bfa9f7e0 0xa0c1b89461d114e2c561375d4a144c93a64018ba 0x3f3f2d8b6167a80756e6c071c95b54a00a6cf3ad 0xcbae4053576c32652bfd37d3e8757f5e8ca2025e 0xc0782dd38bc20dd5e78c266ecbe23d1985a90010 0xe60074f9fe954cf06c8f5adc4ea38072e75d51f0 0xfaa9a0e1db9e22ae3a20b2b58a68dc24d053d066 0x615e272e0f3f688d9cf33ab191b4309fcbad6fa3 0xc4e82355c9d50f73766617f687c6390e83773ca1 0xf05a8d5a840701cdcd272417975ba8f1bdeacd5a 0x2e1f12422e35e0faebfbf5285f39cebe06ae3838 0x521db2cc18227b5fffefabc0fb4e7b870d31b075 0x453c9771d808de0431ad4fa04e020a3ff14008ca 0xe3dba262cb6e1fd1d4897e7f6a375a1c875a7cca 0x4ef66f56beff3f7625cf09704acc60bebdb07b79 0x03f0dcd739b9b1f2fb42c78dc02c64dc76e613c3 0x6a4964a9a0edc0bea27d8e875b26b9f3fb2077e8
