ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B5FCF7AABFB5
|
Infrastructure Scan
ADDRESS: 0x44e66e4bc328ff03b523de8abbc8287c7f7c99ea
DEPLOYED: 2026-05-08 21:12:35
LAST_TX: 2026-05-09 15:45:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
β OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Requesting storage slots for offset 0x00… [FETCH] Received 58 segments of contract data. [SCAN] Mapping internal logic flow and branching. [MEM] Initializing storage slot tracker… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Verifying ‘require’ statements integrity. [TRACE] Bytecode segment 0x0c analysed. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘0x845a3783d4ffd9a589fc508d37207b92c8e43817’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x04346551798cec40eca8d18d9352a14323fc1615 0xfe936bc04a94b1a96a45cc1c8ff786ec403f21f7 0x58e385b2145436cd831f63cb522b396dce89542f 0x7019723f5db85b2d9ea0e462945aed372ef05240 0xe4321cf4f0177ec4c1ef76a2cc2de7afb7bfb457 0x33f2cbcdb1876862772d5424a6ee825ce3974984 0xbf244b361d92fe5000f117e1aa5d7de98cb49231 0x1c861cf03ca8f58c44335acd34041557e77bbb7c 0x0e703701e4f2bc9bdd7f845dabdd460992e1f157 0x9d97b4598a25e85467e3016418b98bfe7012962e 0x1c0a16071e8249f0bad895128c2d7d04771c5c80 0xafcac00e91300873b03291859a2f0dfe4f9aadfa 0xe1c3169708f7fd909adbd5c4780f5815cd8202ed 0xab0614278ae505d92fbb19cee16df8c55dfd64d2 0xaaf4cdbf5451b63e93e2a01e5715068387b8ec18 0xd1de5f0436cddf084d17ba9cb4032a825bf5ad70 0xac6597860c12cbbbd6fc82c5c5aae06be6f73393 0x8e1416bd3d63c0959cb88c96d3787437110de198 0x45bcaf0225144dc9c1b36c53d53378c0cb69aa1c 0xab8191796631491620ff3677f942891f2acbaa7c