ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FFB89E2C1F5A
|
Infrastructure Scan
ADDRESS: 0x41a180762564f8362fd2f6985b253010b8c68749
DEPLOYED: 2026-04-24 18:22:47
LAST_TX: 2026-04-24 22:24:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Synchronizing with block height 9551. [FETCH] Reconstructing ABI from function selectors… [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0xe560. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Simulation completed. No state corruption detected. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Consensus reached on node cluster: 1/10. $line = str_replace(‘0x4f0b366b05f9dc7ad9ddb5d2740529545d6ed0ad’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xdbd6ff297eb424aeab2360da6e4c1ede2f61aa3e 0xc2c2b6ccf519063d9f1b40b8a2b92b95f05a4fba 0xf68178dcb5ce3b52433c230cb7b0ac08badde5d5 0xfc23bb15a3cd4df0fed6c70ed4e6aaff1c8273e2 0x229f4c4eb42a37dcf384650b1103ab0477d0b3c0 0x4eb734fa80d63236887efca97f03da4ffb9eee9a 0x45887cdafa4e511283ff9ba505da9901c8d893c2 0x89b0525335ff7b54e7286cf98d9b95d57f0aad47 0xc328a8485cf2fa1bbf38b4cfaf537304a9bc6841 0x7edc0453ca709dca2344221aaad37202c0499d10 0xbc1449f645926b497b3a402ac9a5d167e7d2d895 0xd9d8ab3e28232d12573fb091dde3a0b68b15a7b8 0x37c3cf809812ef406d433327e707a618d6209784 0xc05a56ce2527365f4b9e2aaae5efd5a2d8b3212e 0x851805fdaa7a8fd5c005cf69b6091eb1c68bdeb7 0x129a655ae9075657962a466ca9ba50f0305463b4 0xa9bf68e832a9bdae3395523a3e134d4ef79f10c3 0xb1cb5e99bcf43f1f8d7692ec054ce19e9937b269 0xdf38def42b93aeeec7d3360c8c222a11aa60dd57 0x520369d3cfa7205ca6a2cb9acd52db6bdfc93197