ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D8168E91D34C
|
Infrastructure Scan
ADDRESS: 0xe3d1ac3b87e8dc46cb4d006cbc8db20f26d99e8d
DEPLOYED: 2026-05-11 11:13:23
LAST_TX: 2026-05-11 20:26:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0xe3d1ac3b87e8dc46cb4d006cbc8db20f26d99e8d… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Virtual memory mapped: 0x0000 -> 0x214d. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] State change detected in slot 0x42. [TRACE] Debug: 7685c02814bc18d8. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(’31d20e26…c6f817e9’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xfe317efca8d336940b2115fbfc8af7794d39bfbd 0xad90516908222c86c10bd10815b260861a802a3a 0x591c1a12447280911cf7d3e48e99cd2f66303095 0x3f056289db1e17f1208f29840de1c57baa726f7f 0x39b95059df9ea53293d4b41ab6ee1c8aa604695f 0x67b961c13f535431c57200aa7e40c928a2d2285a 0x4b7a809a3b36402795cccea96414b93307f59fd2 0x79093f9463c09b48cfcd765b8e76f5904bc12648 0x936e8a1fbd8317be59a9b8924a300993c8bf7ce6 0xb6d4a1f10f2b7b60d8b9e62c589fc2c6ed0ee218 0x6c8728679deb5cd628d6a89b3381e94ad0fcfe00 0x98ad1e9eb4603b5f2aa1770128b13f65d414d687 0xb842e0b664673e2b286d7a0d6a06419dd8bd9f1b 0x688c10797102aa359107bbbcad8d019cfa92f4dc 0x2fd63bce83c4911927106067be71d191bef027c2 0xfa7f515fada8de3fe4cc289fa32df30ff9689e23 0x4af5a3b0c6fcfea39571f2e66c3f01a5403fcd05 0xd083fa4bd1fbbb5332278e026a28963dd1097de1 0xd2a663ef51e2c3641a8eba2ab5295268b05d0e89 0xbbb5d5caea8343df1d75dffae3c7d8713dc2a7be

