ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A0A730FC688F
|
Infrastructure Scan
ADDRESS: 0x3f1612637f2cc5ba4a1ff864d4ad4d553eac2869
DEPLOYED: 2026-04-30 01:50:47
LAST_TX: 2026-04-30 18:43:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Connection established. Peer count: 36. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping ownership-protected functions… [MEM] Clearing temporary registers for deep-trace… [VULN] Warning: IS_DEBUG_MODE found in storage slot 19. [SIM] Testing edge case: Zero-address transfer… [TRACE] Stack trace saved to /logs/TRD-D16393D7.log. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘a67dba13aa70c93d13805c434e0b78c2c10e260bc92165f4a7e011f8cb393551’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x00ae8f7b33c4e3a0534cbbd240d32a99d117f4d4 0x6837d6a2f1335fffbb6b21b51d24d34f12a02daa 0xc834c19b1b50d68dce5334471bc189db9f28a305 0xf568b84761f01d770ca9369c8c3518e23ff6b23f 0x4f33f11365ee5513ad36f887e1c4abbf83c11b52 0x46af615838e174a24c62e64ce097af81892704a8 0x3acf630a625ad483415228faae718d8c2f9076f5 0x877eb220413814a9a194218ca83b87ef1035b1bb 0x2ad3946b114ed0c4832865d4c1648cd0b16b938d 0xbf7ef8efb5946f87b8c62e04d51f78d728b5d9f0 0x9c7bb90958ed7b1d3730acfabb1986c323332819 0x637f70e8d2068e98b1dfed9645b01397914740da 0xc01c97de419b280d010ad266be47109a0f786cbf 0xff0d1131f6957a08f52d536b28b34dc6a392991f 0x189f2fe6783f25c5fe757103d655dbee40541589 0x01ffbd56749b8e644714c95655ea1cd6737f3e3d 0xb9210f37b03db68ae04f579d841cf9a40b98e21c 0x865276389138e19b3c140851b2c0fae6120bcba6 0x77c5aef53c6da00a11f51e21fe40c8c228820f59 0x13aee3cc3e6bdd4aa96f3196afefb205008f4633