ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-383ABB969F58
|
Infrastructure Scan
ADDRESS: 0x2bf4fb69170be5b4e2f43d94875aff8c8819b415
DEPLOYED: 2026-04-26 05:37:23
LAST_TX: 2026-04-26 06:28:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Handshake with node 0x74944cc6 successful. [FETCH] Metadata hash (IPFS): a83acff6…cae9605b… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Allocating stack frame for EVM simulation… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Simulation completed. No state corruption detected. [TRACE] Stack trace saved to /logs/TRD-5944DEE1.log. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘A71BD350’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4ef66f56beff3f7625cf09704acc60bebdb07b79 0x643eb63a2049f9cd89360c26f8e0c8faef30c4c2 0xad239757915b6c084aa24a3f85fe4c245f0e2b0d 0x0445a77d6d5d4d50750a901c3768cc98b91f5efd 0xb94e323a59dfc8a2810241f381d8a623cde59ded 0xc6ad39dfe7d6887de1f81a24487e13419e113f75 0xc5e6ab5b0b5512540c11d71d32cf8382aac82682 0x04d09e4d15d2e1c2ed65154a41414e2eb69874fb 0x88b608c0596f7865d77812db732d4a804bec5639 0xf23a711d55d0c700a4a210dccb89fff990e36aac 0x6afe605e057c8b8ed34a611d39c408036c1ee85a 0x15b8c2d2811019d2df5ba449780bf53f72632a90 0xc98a8cad2e81dbee10d0067c23312a002910314c 0xe842b59bb4af72da58a1317531e4255eb8a524e4 0x581daafdc401bcd35c4d43afc58d75159caccb51 0xb12e6b50f23bd00504c9ed50c7440dd2378f9855 0x9501fcae40bafe7567c97b1b989c57a617365cd7 0x2ffc51cd50ec4bbd432542a18d2b5f41723c84fd 0xab87e4cac422a41b692b202a871aaae65e5cb1eb 0xacb1da9ca3f01c819957bdb31085ec6ee79e0b2c
