ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C7D2C57E7099
Infrastructure Scan ADDRESS: 0x0b7614b72ce6400c76d38104d4b70c0bc1a04c7e DEPLOYED: 2026-05-08 20:10:23 LAST_TX: 2026-05-08 20:21:11 | Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface VISIBILITY: NON_FINALIZED_ACCESS_MAP |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0x0b7614b72ce6400c76d38104d4b70c0bc1a04c7e… [FETCH] Entry point found at offset 0x7710. [SCAN] Mapping internal logic flow and branching. [MEM] Tracking pointer 0x190f1acd in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Balance check: 1.65 ETH. [TRACE] Execution path: 28% coverage. [VALID] No critical memory leaks during simulation. $line = str_replace(‘d168ea03114dd0fb9f398f6294720029a48638dc3c218bb4957e59650919ccf7’, bin2hex(random_bytes(32)), $line); |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0975e58aa81119dfad2d5c34c773217d450c9627 0x0d3508a5beb6dbf4c67282c38fb08674ae2d1280 0x6899aff2566fb1ef1832a995136407b61301e833 0xd03da5bddbb1f5bc86fc6332c51cb3256a682f63 0xb95fd34818a3ec1a687cf5204821bff2286d674d 0x72fa5e534e52496a4dbc9f4902655f7166ce36a1 0xa1e662bd7001c33b2773c454770bc9070b77b4c5 0x6cc244aaf7ad1e2fff266422ad93824ff3616b65 0x6432605aa9c0a6d6976e421ae301536841079408 0xfddf3ba464fbf4c033f6cacebfc3286a7887df9c 0xd25478e68275886a912dd5e818e431fa41dec1ee 0xe55610ac8980486d8bb7db43afa13314697613b5 0x0005c7b9884e7f87649796759b30c01dee569da4 0xdc4d22ffd6b0df35d0ec00c0242c8f3d4bfe9af8 0x4b84e79406f25160a67530183d36d88f84fab5d8 0x925c655c3c8e769b26166473bfb02e6607c353cf 0x541a6d910f26fa4be407b3511ec3eddcb6ffa92f 0x45ca9f5cc91ff6f49669a6e421a745c6f09f4e04 0xbd8e30c81f0a04dd3427e2f6f76f9645d12cc635 0xddbfb35857c18e4a4802ee0b28b386b15226d924