ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5C7127B68F86
|
Infrastructure Scan
ADDRESS: 0x1a7bb9a77fb353bfa09ffe696ba82b399f592bb7
DEPLOYED: 2026-05-01 22:16:47
LAST_TX: 2026-05-06 08:50:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-5. [NET] Mapping peer nodes for transaction trace… [FETCH] Bytecode size: 3842 bytes. [SCAN] Detecting compiler version: v0.8.60. [MEM] Allocating stack frame for EVM simulation… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Mocking MSG.SENDER as 0x0f3c604af2ae736c19233750ede9e62fb9fba1d4. [TRACE] Execution path: 91% coverage. [VALID] Signature verification: 0x31c1bbc54c760612d63f605c73527f96fbd36669ca322e3f30213d95bc3fecd3. $line = str_replace(‘F72B94CC’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa66c864f3c31894b7e1b21192c2a18121491259b 0x9a4ccad826021c1d0838efb8506fcc165768db5a 0x3fa171e593035ad51f27bcbbc162b06cb7e03e5c 0x9e07d0efc092b1ad16b21fcc68078601971cd158 0xdc378a264b0682c1eef933106b3ae019c3aca666 0x4892b9a3f94f21586293b91b40abde77af122a33 0x1a8fe3a27898595479e85573e48786deec51d73d 0xe9c7b9dc442680a431377b9a0657126d25d207ed 0xe9f6d8814b6933a6d4626ea98c0d4e92eb16a6fb 0x9c7707382af9cf38d1614d3012703ae47e7d5045 0xcfa69f140cb42649a3ad40ead5a9abd6f8c5de4d 0xaee99d8ed8144ac90ecefff630bf2c6185d71b03 0xa94742f4429a9e66eb6622be43d8d9662783e971 0x23f5283af5f045ced778756e0815497afac4b37d 0xf0738ef7847737b3a6c1f4cfdc179eb2eaaf36d0 0xed5868ed96c599d14e43169bf505a7736de51a18 0x514d68e323a8e1e41042b048f89b34ecb41546e5 0xcd3efe2648401520a2c3cf0c32dd43a83df1eb5e 0x63bc05976969e5022289bd0b355bde58760d2d3e 0x10f42edc55b1721494dbb309b7bdbce538ebd954