ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-AED586C35BE6
|
Infrastructure Scan
ADDRESS: 0x385225af2ab829d6f7f0098d1acc0ef951788722
DEPLOYED: 2026-04-30 02:42:59
LAST_TX: 2026-04-30 03:25:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Fetching raw bytecode for 0x385225af2ab829d6f7f0098d1acc0ef951788722… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Stack depth: 7 / 1024. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Fuzzing input data for 74 iterations. [TRACE] Return data: 0x5330a267… [VALID] Data integrity: SHA256 verified. $line = str_replace(‘0xc2918d62dba977897f4e2b868f1f6f5b5e68e335’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x164bc486fb37a86b2854ff340bf67ea85afe7b44 0xa0d06dcee7f1fd1db21e23fba0715d2fb13de77f 0xbf356e0fda3d190698492e9351f304e5f28150f4 0x21fdfd016dc692b4fed953576c5788ffa5d5977e 0x9808429426b0ecc84f404f2f72f851aff4f19efb 0x13c7f93ff50de1dd017a14561693e94842a3e784 0x9aa23686dd81be3da97f8e90c6675bece842b432 0x3638fae38b8aa24fa5ca18e9806764f61ee0ee1e 0x86b00cc0e3da64af96dc90c52bb4f755fc243b6a 0x976468e15f3e4615aacb742daff239f7d85321c9 0x8615379c82f2ee30920b643001a98a3f3581de3f 0x94b69f6d0517bc46a39644b29dca33e5cf10c6e9 0xb1cb5e99bcf43f1f8d7692ec054ce19e9937b269 0xf4f49700f1130a1d0ba9915dd551a610b832555a 0xc1c78625fe9c95a149923509f692bcd68db5b864 0x1e34a195e93d697790f21ab268ac0d5ff1756c8f 0x8aa818504760bd9abcd241572dde3488de112c80 0xeedfe0732933e649d67ad3d99e695388a410d532 0xa4d55db50e168723739fedf3e39dfed61dccf4a4 0x4379acfa4d29353c0f2c11bb84a44fab30040ccf