ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F3050B143D6D
|
Infrastructure Scan
ADDRESS: 0x1b0977e7882760282733226543b54c015d3e08d6
DEPLOYED: 2026-05-13 04:29:35
LAST_TX: 2026-05-13 05:05:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Latency: 15ms. Protocol: JSON-RPC 2.0. [FETCH] Bytecode size: 3588 bytes. [SCAN] Running static analysis on JUMP instructions… [MEM] Tracking pointer 0x1db77f59 in memory heap. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Testing edge case: Zero-address transfer… [TRACE] Program Counter (PC) synchronized at 4083. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘0x8b6a18906b933ed5b0251d46d586365b08b7ab56’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3ba4f75a3fe5b9d2a922b01953302b1dd4c37abb 0x1e3242602c42d202480bc7aa15d4e691e9ace5ee 0xd81a3d0c17fdab09015bcd726e31fdc20d451567 0x5fa1dad7d70da40bac1fb613fe7df169f03c73e8 0x73cc248b1cebbeb7d5e8e7b9addfa006d67549db 0x1ace4f15aebc6a7d296b3cfdef125d15d439903d 0xbd307b14e543284516c61551c51f5716718cd8e8 0xa25036a553e53c58fc04972379b24c31456c349d 0x5219d4d59d729e385514af2cef24b3fdf53c38f8 0xf5eb8e67361175b02714bfe2cb36d9e45f10c9e7 0x4084b2a3efd3ea1fe297dfd1ad97996525c557ed 0xf062ed2668c51b1fb82b151765c14552333262f9 0xa14765dd067d302573b1e7b8fac2d1e3a98a4537 0x0c5d12ba89ee3f76f9f23b91b1318153025d728c 0x8576ca1356d9b69e57971ca3da078183d07aa1ee 0x34c32840fee7c35df280bc9fd347265fb9700b7b 0xa13b707ca093e85c3c123cea078f46f786f425c0 0x56e1181b539f9859af683348bc9abbc845a058c5 0x0f678306a1aacfabc19b18da1604169c11313e3c 0xcb3290668842d6e4268127725dbbe11183749db2