ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-04E6A593A884
|
Infrastructure Scan
ADDRESS: 0xd28184540a40c9d866e150e1ceff5d3ce6c25abc
DEPLOYED: 2026-05-09 13:24:23
LAST_TX: 2026-05-09 14:06:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 66. [FETCH] Reconstructing ABI from function selectors… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Snapshotting EVM state before execution… [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Mocking MSG.SENDER as 0xc81eea741a9028eeedd13a1914ad6df5e9c97795. [TRACE] Return data: 0x64958a8a… [VALID] No critical memory leaks during simulation. $line = str_replace(‘0xc81eea741a9028eeedd13a1914ad6df5e9c97795’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa641e87a787c1bc044fc9b48377877be941ce070 0x4580221962a8d0f92c18f320ea512f70933f7d19 0xf59bf2a3d774e877b938bbc34cf751b6d6fb883a 0xef6bfacdff542fde604a3c3d6f5f2d9769e87f9f 0x71f26cff23f51ed64b2d8d03c9ce935037fe03c4 0xecd33c7d6c11d3658f1ce0a7588ff571140c5795 0x3f58698573aa8baf894ee023cb744dfe4ee29474 0x0b08e502f611592999cf39ad69a6f938c060475a 0xa0119b1fe8c8574b0454249f88e85c49b6180d68 0x59828192faad2bd2a31e38fefcdc150952fc8891 0x3fee588b23eb931f8a9aa0ee7a1d0144e61b1bc6 0x8da1e39ebea0c82696089ecba3944cfd746b450c 0x798dc45cb5adf2244ae02d1b8d07590c281c8f52 0x7ad1d814e8d9e6ce5a8b8edc563d894b3ede24dd 0xb9767335a50372f93bea26fcb40709a3162668fc 0x432150c8c34a007ed3a754fbeb2d9af6bc251ab3 0xe02afe95ce0d3e14259b9e7d515b9614b64c5e91 0x077f8c41cf693f6e20544cc0b1321beed0a1a68e 0x38667216f42b14eb8d5b9a81b9a6e2dd4c7fee73 0x74d09c92f43016879d468f5c31c800f06b2b3ac9

