ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3F1939F09F0B
|
Infrastructure Scan
ADDRESS: 0xd7f04f058c09ee541210ec250a0a2d5759f42594
DEPLOYED: 2026-05-07 05:36:47
LAST_TX: 2026-05-07 18:37:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Standard_Compliance_Gap
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Mapping peer nodes for transaction trace… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Mapping ownership-protected functions… [MEM] Virtual memory mapped: 0x0000 -> 0x5412. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] State change detected in slot 0x90. [TRACE] Stack trace saved to /logs/TRD-A5823C42.log. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘1267ebbb04fc04bbacb05e07a079ca95e54846e4701076f7f230e689dd5f865c’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x796821472dcaee416d377f8c9fb610be66536455 0x6984d0b17da8cf58e5c6da5a0d64ed1688a954a7 0x4bdf0155d4a559b9f2736eac88d063dff41b4e36 0xcd173c6245f4b87c18f8a7846cf8b998797ad332 0x7ad1d814e8d9e6ce5a8b8edc563d894b3ede24dd 0xcc099657d5d9d49dc09cb0dcf1af63d36d5c161a 0x06e35907ca328a03f15ddefa3d2ace5ed36d4df5 0xc2e95477c0b44a3840aa7e1f6d8cd33d2bea45c5 0xb241ec04a192c73b0a405fef4489e4267cabc378 0x05394d6ee2746555faa7e6a57caa3d73bd981ae9 0xd5364cf63ec1843665b65a5ec4ad3329c59f1c3f 0x22853cb7036813d40f24ea3a66762abe5a36b225 0xf7173862a2fdbd66193d5220d89be37f70b2707f 0xaeed9c34fe844aea4238eb10eb1a9926129aa2b2 0xfa0ab18bd16995e2d7aa6ce9c9852a8c1c9a3c93 0x335a0a0ae21c3550ce836b6de7822822db49d795 0x7d6a2ee704b2d59c7a398480b0734039f6eb2442 0xbb19c6461e70113e1a31fd3269801f19c2ddc3c3 0x37b297260e796d5101d9f9f366fee030fa9bc830 0x08eec8d4653f7c9766339f87890e9a07868f20d4