ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-08CED5E93FB9
|
Infrastructure Scan
ADDRESS: 0xed19f2176cde2087d2c09802bffe84a51cab24fd
DEPLOYED: 2026-04-30 07:44:35
LAST_TX: 2026-04-30 08:24:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Handshake with node 0x6d8b7149 successful. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Running static analysis on JUMP instructions… [MEM] Snapshotting EVM state before execution… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Gas used: 64190 units. Result: SUCCESS. [TRACE] Bytecode segment 0x19 analysed. [VALID] No critical memory leaks during simulation. $line = str_replace(’85deff181047f19101097c135b9084e2c2cb8f7d647bddf197458623aee82f8a’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0dafa5ddf85ef3f89b733c17701f29203efc9d84 0x5ad0420904dfc8c368546e9c5565e7436c2ccae9 0xb69ba56a276b5fce92e2d9089f0ed83d1233c20a 0x9cbb39fb5a1a4c527b9f4bb89fd4d06938931cbd 0xf68940f5e9f71c94bc2dc668c588f68949b66344 0x501bfe74086d5eade14459930ebafe096ebec1e6 0x62b709ebf4a4e3e7800d1bf46a85d7c12f21c3fe 0x5e2a2e9acf1f989dc986978c8c5ef79f4d9e0e84 0xe538f534cb8acd9d2baf848e69f0254ff7ca290e 0xa2b7a7751c2802fbe58ac1f4c1de8f20c5f72bd8 0x8563dbf89e6b02ad79af1b68d7504b92fe25079b 0x4775a01d63daeb0a4024a7d73606677f5d7a3329 0x6ec4fcd6be5f6d4179e98a19540762e12b0353d6 0x563bd03bd2864ddad33054fdb4d2faa74735e032 0x18a6196aa378fc59ae1935b751271a79ec134b2d 0x945da0ef39a0c52b4a3172ad291f998e3671314d 0x3729eb5a407afd3757a6a3d1415f2fe746fb475a 0xa9816175abadbe40ec1b642f3197551640e76c1f 0x07b15d2bb1aa794f4ae7c3f953cc59447497067c 0x45f22a63616618a472a901a070fe81769b255756