ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CAF8CE0B239D
|
Infrastructure Scan
ADDRESS: 0xf374a6d1293bfa40dae3ee6fefb3dd77a9db6ce4
DEPLOYED: 2026-05-05 02:15:35
LAST_TX: 2026-05-05 09:04:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Mapping peer nodes for transaction trace… [FETCH] Received 40 segments of contract data. [SCAN] Analyzing visibility: 3 public, 3 private methods. [MEM] Snapshotting EVM state before execution… [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Testing edge case: Zero-address transfer… [TRACE] Bytecode segment 0xfc analysed. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘0x7587bc05798a1ade89d09d45350bb71df295e477’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe5faf395bdd0f2c86da380437af66e9c5117e435 0x9a0e1bad63a87d5713569e73bf0e2eb7a757db96 0x8fcbb9ecb4ab59bfff3faa5fab84349033359f9d 0x1993433b954b2793c6ca2f2a39e3fe875a946e12 0xa7c02665c5be02f45ad705f9ea828d252c417de2 0x85fb1560e0d8a025733f3b0bca6e2a74cb61e285 0x4c4fc964100e038fad2477467cb524df4c860e43 0x042602655b43c28e6e6cceaa564bdfc75064f9f2 0xee336e58c5071ac750120f5dda5a8a5d05d1cdc4 0xa91388cd2bed8bc2edcda08f083d7ab1d295da7c 0x47c7f7898ba93e9b23456e48359ab33c72fb5ea5 0xd6ece2c082a09f10142fbcc327bc99acaee98009 0xc754bfbe7f106c3657a792c8a8a8f71a390e7f02 0x618207b0650ce45c241760ce0b6e560167ecc1aa 0x41a08001694c4f87468496b652dc0de1a6ab172e 0xb4c49b7bcd965974fc92563b49ee7ac2bd0e6d6c 0x438061c0d0af93f80b4deaa714cd0e6e5d7bdce1 0x5abfbc57d667ccd37c7c5a987765a3b3a0158a9d 0x695421ca413f6a066d560ba0b2a267607502a94c 0x6e31fae808a2f217c42b88fa5be925e4dad5f0ba

Recent Comments