ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-DA40A310B8BA
|
Infrastructure Scan
ADDRESS: 0x4c3db57eeeffb13a17b9ab19e0074d27799845dc
DEPLOYED: 2026-05-13 15:44:47
LAST_TX: 2026-05-14 07:12:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0xae2d61ea successful. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Identifying function signatures (0x7ae362b8). [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Reverting transaction at PC: 1028… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] No critical memory leaks during simulation. $line = str_replace(‘0x96533b465e9360d6ae97c459fd3faad18bd83fdc’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1f3fba227ef1a3b5be1cb008c1277bf15b854c88 0xb3694142237e6249bdb7d3db93b85749721299ff 0x894ffbb7039a2d0089e94fcb3b9ce2f25668ae11 0x2909e6171c9db4c341636299ee2ff1c5b2350a93 0xeb9c79ff03c7cfb673e0bf4d2f00adfead8609c8 0x234b097da7dd54fe6ad4cfb3fd9d84f3f9c46989 0x0905a5596f328089fbf8d00b5c70da04ebb8ecab 0xf172a1b572be4a2de338b16b07343715a9f039b8 0xa36591fdb42b0015c1a46f36c1c9bb640bf1c46c 0xf4e2ccd28172c7d27ae5d61908933eda66499df0 0x511c035d31dcac8ba967208babd994372dcaa102 0x57c525786fc77dbff975790a8d823a3513cbe2ab 0xc4acd372bc3ea7f04cc4f301ab8428a48695746d 0x0680fc4d4818997623b60bd6b948aed33d5e94aa 0x6e1a958c6e94c9bd988e7bbc1a11a944d5aadfb9 0x85b6b338039fb3ff156d4e968f026372ec7c6851 0xdb155b2a9991dd17767c534c26cdb455a4373410 0xe838b5fd8f4c9dd6ad6e73b3f69fb9dfd234fb1a 0xa6990b34effac3b797bd3b24139c7f10ca0ca1c2 0xd01a2b4f7dd29d6db4774d0775b96241460f9c11