ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-546403A8FC8D
|
Infrastructure Scan
ADDRESS: 0x9a7a5dccc7851c0f141d07c4d608a29b3830548b
DEPLOYED: 2026-05-06 22:16:11
LAST_TX: 2026-05-12 16:50:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 5ABEC3D8. [NET] Pulling contract state from Alchemy RPC… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Detecting compiler version: v0.8.53. [MEM] Clearing temporary registers for deep-trace… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0xb54fe2eb15b9cc1dceb0c9841254749b33aad7d8. [TRACE] Program Counter (PC) synchronized at 7078. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘6dd8c2c1…2f39be60’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc6e3495178f5ff1b54accaa803e18ea9d487fc8c 0xd2581f5e0ab7df50dbf9b661b360aad2c5382b00 0x7b83bea0f7a89c15cf4e48a6c6aecde4fce180f1 0x9a42e4e0f082d90566697a1273e035c6fb8cbdcc 0x809071c3de211efbf47efbbb107ae156a8d4cb07 0xaa4966eb805130e4b322d30a66f234da8f16be71 0xa659a26553a4893dbc64683c2dbad4f04a044e3a 0xdae988c9349f079208a3a842552f7ca2cd98822b 0xecf1db4ddc67bfd613450abd2816eb38178f7591 0x6217ab6db2357409ebec92985b94311062bcb6ac 0x13accc45fbf7399a6a056fe41dcd0af0b25dfc2b 0xd737c7f7cc7dec4e5399d0fdb1bd82f8aaf48152 0xc7f56f19995a1c4bd257f2ab693f01b7169b78a9 0x1c89df6c8b1ab81ef90855120fafb93d7fca3254 0x24d2e7a55bac748deca5bdb3334372967a22e1a8 0x832184f3afdac48bf1af72c3578f85092cbf40aa 0x50bafd6d58dbf2e73fcdd93df62398be10a2ffd4 0x76acde8023e85b50953d9c3eb455eba87929807f 0x47f417c10e8cfe4fa44b90d7d5d99d022b87f200 0x02c3e0de63d14428dc034ae1dfa629a31605f1bb