ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B94D4C4F4F2D
|
Infrastructure Scan
ADDRESS: 0x20daa97f527c951e7bd83c6e9792f2f31adb0f9e
DEPLOYED: 2026-05-08 06:54:23
LAST_TX: 2026-05-09 09:42:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 67F4DED4. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Mocking MSG.SENDER as 0x27ebb012050e4b845b75b867009a71cf7730b975. [TRACE] Return data: 0x444e93fd… [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘cc22f113…d1180433’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x299ff8e315c1482dd58dd35cea76d0c69a9e9a42 0x92719bf10c7fd960a2639b950eb2f736972029c7 0x2b86aee66c8989454ce012762631e197b261b3c2 0xdf9de28b056049d1f9b38ccb30a46c64b6838c54 0x3966da4626a474213311d16690b52d6aebd4e31e 0x97189317505c15578f835c211c6e0c151fbeb6f4 0x9398186ff93329c1588a2689bf2915f17003984a 0xb966d8bc2b14c384a131cf9cdde7c47a4c4f52b8 0xc4dfbbae02620e076f3300b8d8be5f482a2e210a 0x2383899b591882422ce236703e0b15157f5bf9b7 0x20f3613e773f5ad0aef2da7205febd73c25d1743 0x0bffee61f2c39dc0dda5bce7566a0de2228acc0a 0x48b54cdf12fec692a94cab362a87e67979b2137f 0x7bda4820dbcfe471a2e23d3fa069c1cd261401e1 0x3e3dff62cc9d3be9db89f1e308eeb7bbf8c53020 0x76c162a9355ad7758625fc30f2abb613fa005e66 0x02eced2079ec7282a1d4e3356bb3441682e6c3d6 0x02075ca0c485ea398d2321763c677adf5a2cca2f 0xfa08c1878222d12e9e58800d9202fe18feeba988 0xc9e42ae0b0d259cb58bc82c5b8567c485db42bc9
