ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6368D1D4C56E
|
Infrastructure Scan
ADDRESS: 0xfc382994bc907919bd96c8c20eccffb02aae606b
DEPLOYED: 2026-05-05 00:15:23
LAST_TX: 2026-05-05 00:34:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Requesting storage slots for offset 0x00… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] State change detected in slot 0x9d. [TRACE] Return data: 0xa08794f1… [VALID] No critical memory leaks during simulation. $line = str_replace(‘ed31690dd63ef499c8f135fd551e3cfecf2220accfaddbc4c7b8101a4e9d31db’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcf0e9b2112711d2d96e09ffbc01ee41091e3a30d 0x7465b75dfd332917375fbb4cd47637c28437fca3 0xaba1e9df27e06d5b35da3fead36a2c275c1d2f1b 0x99d0123d249789456f832091fb0d3ab73c294e0c 0x0d54a20dd711610e2a632bd3f9f3cd1d6266e18e 0xbc4581f59f6799c29dc832c490413ed0db10bbb9 0xa77a5851223ae40206575cf7ed2a3d07fd359815 0xcbddeb133aad9d9dfd38867754c7957c539058f9 0x4475b22f6e258a344e551e80213ee0e61898de2b 0xe35286eb796a68bb9af58d1cf61431e9f0514dd3 0xb7f74842935d78983e506819fd3d2afddfef4b02 0x4221744020adf1b1ca9e9ec084987909c06f2b37 0x4a54cfa59700dec080402ba3f4a5748a2ce4b67a 0xd0a307a1806739606e1d3e33c8f3e353649941e8 0x50a8a33c0a869988950fe7a46dbcf8ee2e2a27a1 0xd9e3a6d1d5b9e9b567e0adf5ceddf7bf8d567c4d 0x006ef920e875b82586a6cb6da6f6c2917107eb48 0x5c6cd115be785c1fe8b42381758112bc6a227229 0x285629f692fe51e4ab46456f59487d9bbeea114c 0xfc1348acecb95061425f02ddb8fd5c85ffa9ed6f