ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D8B524D898D4
|
Infrastructure Scan
ADDRESS: 0x5cc5a48a8454bbe57e66b3298578e93d1b610ff3
DEPLOYED: 2026-04-20 15:34:59
LAST_TX: 2026-04-26 07:35:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 35. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 6 / 1024. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Testing edge case: Zero-address transfer… [TRACE] Return data: 0x557db9d8… [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘61298C93’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x93499c9b4da6c8ff674d1e85e0976df43b3d5524 0x5e90a85837c4588a1a6107b8c620342d3a57fd53 0x7484379d1af1b718dccc6bb5e58aadbcb6e4866a 0x0250a7e63fbd33e36e3f19bd7be413d9c436472e 0x1eeaa29d865f91762064597e1311ca823f1e1b2f 0x2791cee39330fa516a677905acec3ad42126780c 0xa1eb6fe4b56c67bbf08cbebf30bd64da01ba3877 0x41a5b05e863e594cc95e8cb2197edc0b23e6ee99 0x74b0c33fce1f9624edbf52725d02b66690c08706 0xd935a9f586dfa83df20553b40ce24f3746b258e2 0x8e54a03d4c0b20223f8980800a83e58152c7099f 0x9462fdfb0ef8585d633670f4abf71a7c26772365 0xb50cdd763fea9e5faa7fa8a49c69f8cfa995b1e8 0x4eb106c44ddda28001ea9b5a3a6d7835546fc53a 0xd90c5125c43c398c6bdbc781d2eb4afab3ee8cd2 0x831717a6682f043fd78e71e5f4e4135376afd209 0xe99410e4eb597199ff9ba84c5f8006e21439a322 0x104f480fcef4f1a0376e81b4d01a44fa7841cae0 0x2887c9d6748e9e58299d22ccca5a42e2cad82097 0xbfc9e1ad645a9c0523b36dd56342f18214fe4c1f