ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5C272F557F28
|
Infrastructure Scan
ADDRESS: 0x71a877b8ee36cf833d3f9fda193ea29d24ecd380
DEPLOYED: 2026-05-09 10:26:35
LAST_TX: 2026-05-09 11:04:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0x14a495bb successful. [FETCH] Reconstructing ABI from function selectors… [SCAN] Mapping ownership-protected functions… [MEM] Virtual memory mapped: 0x0000 -> 0x42c9. [VULN] Warning: IS_DEBUG_MODE found in storage slot 85. [SIM] Fuzzing input data for 28 iterations. [TRACE] Internal log: ‚OwnershipTransferred‘ event emitted. [VALID] Generating cryptographic proof of scan… $line = str_replace(‚f607b0ec…98d3b98f‘, bin2hex(random_bytes(4)) . ‚…‘ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9a89c831fd180501624299f17781a6fac8ce0ec6 0xa1a5a9f8f5fbbcac8cb0c607e1c31d8c54941712 0x91bb8d5dec0419cf99d15374a762e53fd3ee4b2c 0x4c0798d6a09894c54d52550a301e6f0eb2f6e9d9 0xfe24c0d5dcda33bce3b92914331fd7448b07776c 0xc2ab9444e0ef0a92b0047bc4fbeb6ca360d07e3e 0x48987b14b086e3057b2a5c45a6850ee97b9f91f1 0x9dcba00508fb3c583f1105e16f2f61c4f215c3aa 0xf5019addb0bc7fbd78dd2a079b74611d32d6d3d6 0x7b55fcf6a4047cca6a0ae09b0c7c3b32dff6e4be 0x8b3c308e2d78d1eebd7ec8c6c078c77878d0a49f 0xf8d116750876ea55405f017ce456e5ced4ab4219 0xe5bec830d7a7a084e24b9b76c249c39b752f12bd 0xac57505dad234b0f4e6693114bb39907453a4c0a 0xa45f95d7a05dc96960b6104254b309356c31a323 0x796821472dcaee416d377f8c9fb610be66536455 0x0efae2022d5aaa895c53d216b9eb594e414d5513 0x961bf5988761af66b60b9ba8e43c136bf808be12 0x0171589388acfba22e616f53cfed2410bb5fd77c 0x03d34bf8ea1744e3fc9ba8f17e5b04cef45a3e62
