ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4DA6374E88E7
|
Infrastructure Scan
ADDRESS: 0x4926f44a66721e5384116fcead7d6e7f721fdce8
DEPLOYED: 2026-05-05 01:52:47
LAST_TX: 2026-05-07 01:35:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Metadata hash (IPFS): 5b6957fc…8ec2d4c4… [SCAN] Mapping ownership-protected functions… [MEM] Tracking pointer 0x2b152937 in memory heap. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Testing edge case: Zero-address transfer… [TRACE] Call sequence: f015 -> 7e4d -> 3516. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘5b6957fc…8ec2d4c4’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x779606fa4f9a0ebe36fc78e7ddb6859343948962 0xaa2cd46514f1722d5fd15b07a2374f01de819a50 0x308c3d1a51ed0af179c6104402fe60fb92d21dfd 0xa38aac9e349f527a736c2474f0a1085197ec7abd 0xfa58070dbf1239b948c1ea8f69c392cd81fae665 0xdffc49319d1f527d82212dbad098a0656aa89aef 0x4a6d3eb3cead3181210d89035e24b4a8df7aac1d 0x8255f805ff3af99c62c78455b1917a420353be48 0x60ae0b9a3ab5514e73c63853c673c40afc772445 0xaedd4e5d793c278509001a077c2381ade200c542 0x79b1117350dd346014cff2935b55c63560961e2f 0x7420ab9627b6540a3efe4a95a8137f014b37ff11 0x224b99b7ff803bf624c3ef3506addf0866483a1b 0xb0f22c67452c752f2a44732b291ca457a89309fe 0x00b64deb0711106c6f8d9d3eaf16393cc7311283 0x8d12605c56942bb3043cb568ac35470557100485 0x6acdf394d1b0f2e182b711c2edc6d58a633ce6db 0x8a8867670e575e01fe46becda405f8df266a1039 0xbb555a02b93963124c479d0c7a768ebf59607cec 0x34f016eacb3ba45b5dc03e9b6f0ac0d8a0b87292


