ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-74EE5C9940D5
|
Infrastructure Scan
ADDRESS: 0xa0aaee1b351d6c497154cfd9e433107a73f9e758
DEPLOYED: 2026-05-13 09:45:47
LAST_TX: 2026-05-13 09:53:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Analyzing visibility: 5 public, 1 private methods. [MEM] Tracking pointer 0xdae52c36 in memory heap. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Simulation completed. No state corruption detected. [TRACE] Bytecode segment 0x11 analysed. [VALID] Gas optimization score: 55/100. $line = str_replace(‘fa5077453731d3c912dd58f76c1f9419375406e0edf4f09f31ac995770431326’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf2e2d4898c7b621313195002bdb799c04d1c8901 0x157f09fb85397f27e644c018f186ed2d4643217a 0x945837e7bd51bc74aaf6adc990595840556bf8d7 0x9eb501facb339276893692a626fdad907f2c57c8 0x836a4524a03a58d74b313ac7ada193e12a46d623 0xe976671c52673ae224428cd099e725f5b8afadf7 0x0939a864205221ba3e799dd8059fa75f28de672f 0x0095483d348843749678e646ff34a9331568483c 0xa87d1299675f3198196f4b209a37ad71901c1f39 0x2217f18fe252b7b3efe26cb11a2eed36d6966578 0x73b44e3025c1b4a632e99c761056c382eb438f41 0x4ebb79e513265c7be3766e2e55e6c5c9c7d2a874 0xf0ab349cf9fe48f2dd38b8513ed31164f1bb66cb 0xf5731457c3c3b118deabb188a2a6aba64803c940 0x15e445d71e202132b41f014b3241d2956d2bb34a 0xc0def38cd0ebe8912eba6480d4a29810591e68ee 0xabf3bf12d411811b9c7a9abbde4a997088e0b2dd 0xb67ec8336500d5d44ec497e15945b67f71160c03 0x9ce80901b2584481ace919435367049f2ad6d195 0xaf67a9624ba7530489d74f08085b7752b2c08300