ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5D09A7110061
|
Infrastructure Scan
ADDRESS: 0x5dad832a4a4e64e720fa615dfa8a8d5c9dc2be29
DEPLOYED: 2026-05-03 03:12:11
LAST_TX: 2026-05-03 08:23:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0x5657bdf3 successful. [FETCH] Received 31 segments of contract data. [SCAN] Detecting compiler version: v0.8.28. [MEM] Allocating stack frame for EVM simulation… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Reverting transaction at PC: 6143… [TRACE] Program Counter (PC) synchronized at 5959. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘df9239de…0947cfcc’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5a3357f0876cb88552635ad15e11bf49a33938b5 0x154019fde59984d7a20d92956530af4b102552c4 0xf3fca6c894a76e8eba4e5a9c28298b8ecab811b0 0x129bd0b4b0c2e11bcd89e1cefaefedc7559f40ca 0x28cbf21b059b4c080f7856e1b4c26338b48d6445 0x4a8a7af29798d30e8e4b535213e251aed1ff8f4e 0xeb4b98dfcd1152d3cfa889e50e353fdda2e506f2 0x73f9864cdfa0fd03f4dddc27e689816295f4ee1f 0x8483d7097fe97faf34aa63c6f82b2cdc14e9d56a 0x01a946374270d877d245b2820660982f40f6faea 0xed91fecedbcddfad9badd3fa376f5f35335f2ed1 0xf7852f923a55075a6819a79cbfd521c8b847dc6b 0xb350ec6e12650efa0c29656863c6246a1ed84e3e 0xf88af992c04c082816a534f3b5064728e67913d0 0x93a7bc7edba3d137374cb8d158578ee020dc62ba 0x22c0033d4862a0f8f65e2174a281adbef58890a8 0x73182c4945f32c19557884e66c8e4ab15a2bc45a 0x8ec7ba7dff7b4259ba040a469f8bfcba24784366 0x94843b867cca1f70508a292bb07e6124275946ce 0x31fc1cad6e53843aed4e3637bb80718ac0a4f5cc

