ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-34CC845F11F3
|
Infrastructure Scan
ADDRESS: 0xedcd1cf62caa9bb55ea663805e3ffb63c59bb2ed
DEPLOYED: 2026-04-28 10:25:47
LAST_TX: 2026-04-28 13:20:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Handshake with node 0xa5af3fa7 successful. [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Running static analysis on JUMP instructions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Testing edge case: Zero-address transfer… [TRACE] Call sequence: 7c72 -> c83d -> 94bb. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘2091715C’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb314000941309deb55e3acd278ec66a565ffcb9f 0xe2699b2d54fc28e5240d5dd2d93d584a060b9ec2 0x29af7569ce2056709fe492df1711efa5163f7a3c 0x451470f93c218c230fe3295adf71e1fc24ef1d3c 0xe5f65a68bc5330926b73de891b5a66396b1804a4 0x4ebc57c5f785cac771196cff1ff17c56e52b3f9b 0x5bec4be99a03a9b9502ebb537af6eae4bcb310cb 0xdd7afb18511751f4f644efd17c76140fea62beb1 0xdf0b529043ef7a2bb9111bad26de624a326bacf9 0xa1d680b11df808b285686c434c9f2b029f9425a3 0x2d6bc7658d273b26a50cc19e557f10a366507308 0x12fd3db5ae10615873a4eadbe4085d0698965139 0x1b68e447f75dc5ca7bec7e0c33be2277f2d44c64 0x503972ee3a62480f66e7a1bd485dd5f7da754bec 0x3b36aac99a453aa99e5bad66b136cfa23b60eb23 0xf30090cc1703ac7038426be74b80ef57c5d83b88 0x8abbc77aeb115e74e91102437655359ae0602fda 0x803cee85f7d89136ab32e264ea8943170a8e5926 0x5db87c5694a8896c4684acfaf0b1d2626904a558 0x21359f2e107d2cd1d0a1c4be2cc07bb532e13b16