ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0F98F06FAC2D
|
Infrastructure Scan
ADDRESS: 0x25ff290edb1c1837cde76a8db99f62be6e7d9aa9
DEPLOYED: 2026-05-07 18:40:59
LAST_TX: 2026-05-10 12:17:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
? OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Mapping peer nodes for transaction trace… [FETCH] Received 60 segments of contract data. [SCAN] Mapping ownership-protected functions… [MEM] Tracking pointer 0x74298fc3 in memory heap. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Reverting transaction at PC: 1295… [TRACE] Call sequence: fce7 -> be63 -> 336a. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘0x5347bcaad344dabef48220485f0763955edca282’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xeadeb674d7d4e9d6cc63192ac42bd42d6e926051 0x58e0258caf140bf3fb3727caebab5ed7ebc30ff9 0x1673370f4015f47bbf10b5e052584c008ab75787 0x5f361983b12a0babf39ab70a52804bafaf30c9ba 0x69c9431dbb4f439cdfd4b913c185565b4c3998fa 0x95a91c1e055a565b0f8fff8591690208037ff757 0xf267b8ad52726b03c7aec9954bc3f61fc9998f61 0x980193c9d1d9ba9bdcd30882d95be4471caf7f5e 0x688bc776cc6a70d1ca1365526229f161b35c95a8 0xb7488ce4395a0ed6eb6aa593276fc7114709256a 0x1bbd077d9ac6090f3f7f1fba531865d691b567c6 0xd062f8c5f91077620307ebdfc40c9943decb66f4 0x5019dfc580b60fd618d242f50c9be79ccc66b6a5 0xdbe89ea33eb0668e934e767f8376d6704c7bfb8e 0xa43d66d4a0a22446c2e6a64c4758da6c2367dc15 0xdb3f7f9d85173063246e71f71797a6011dcf4556 0xf325e13bb52faffcb0d98a12d7c53f63ac26ee53 0x94d56b002156ae94a897a58ccd42a451327f9877 0x09fe84129feb003b1c82e28ea092a1f109d37f88 0xdd658fc5910933595074fadd27db4f557b0c5766