ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B76C91EF02D2
|
Infrastructure Scan
ADDRESS: 0x608d424d51bfdb477a5da0224a62ea921ff5fef6
DEPLOYED: 2026-05-13 00:43:11
LAST_TX: 2026-05-13 01:43:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Hex dump completed. Entropy: 4.47 bit/byte. [SCAN] Identifying function signatures (0x83494bf0). [MEM] Clearing temporary registers for deep-trace… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Verifying ‘require’ statements integrity. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘0xbf9718363483fef9d18d40e93c515df5d7e055cc’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4bbd9568e7928e46d49b56c705020feefab47136 0x743d41eb9b9b25f5c49cbf38d49b8f24a34b88b6 0xc59936f7331d98406fd4bd16539884a008ae3734 0x454bc11df3828c06d6795be09628b6465a78d38d 0x7bb11cc8796bf678a19257bcf2c9b18cddd59332 0x8a986f164c75ea9e5d6594d9929baad1677c42cd 0x972f7513c15f03d390c30877c3614ae251e8689f 0xffa57389cf7c6942253aff2b692650d64e5f5f76 0x5b17f510083c616fe4162936d15d946923d8c47f 0x6d78b42baac34f3947341c52cd84c1dba8c9741a 0x5282012e8269eacafd4ad7ca6b906906925accdf 0xa659a26553a4893dbc64683c2dbad4f04a044e3a 0x6458b6d79e2762f9c8c83a363bf1e1c9a7a364b8 0xcf27c5514a7aee029277238dcc7bd1e13bb95788 0xfa60789b78a7bebfd7475104ab9b223b7d7e4eb4 0xf5c5027aa91b044a7af3b888115d765df3ac988d 0x440241785c15c4f75041f7ad2da671ccba62e8b1 0xb89213a7dff18073e6a2ac1dec78372011fc350a 0xf2640b07867d05add994e3c86bc1d221cf38a47b 0x7bfa877045baa857428db66d15defc8d4567ed11