ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A231C4C0D1D4
Infrastructure Scan ADDRESS: 0xc0944ee16db346dbf089612f1cdbf6fddf79001d DEPLOYED: 2026-05-02 01:51:35 LAST_TX: 2026-05-02 02:31:11 | Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling VISIBILITY: ELEVATED_PRIVILEGE_RISK |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Mapping peer nodes for transaction trace… [FETCH] Bytecode size: 6854 bytes. [SCAN] Mapping ownership-protected functions… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0x4cd39791e650365a723d40f9ca936572c003d74c. [TRACE] Bytecode segment 0x25 analysed. [VALID] No critical memory leaks during simulation. $line = str_replace(‘7c41e13d33fca219a366fc54b7c61817e06e10bcefd40e7180ad2388715804a7’, bin2hex(random_bytes(32)), $line); |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x80a4dc09a7672b8ca72457bedc86f97457dbc76c 0x448b82d79572bcc1c2adf330a8bfeafa7ae25575 0x7e0e52a57d4e172f4f235b14ab534e56ee6c4b51 0xf89c4be7c747f3e8795f4c5bba174a2172e89baa 0x9e86066f2b4d29f19dfb10dd0202ebbc26738995 0x421afc79a7d2d341bbb928e62c4645e9d8c55f26 0x334a95bd1271a2a5ba8bb3886b89a9adb01a9a6c 0x06d57fb30132bff6322b1153c2a559a6b01e9535 0x01237e6701f9b04b0843e1713b9db6ff0b28f462 0x4ee52e7d727e19d5cdabbdbf231e8c36d7678f47 0xa2853602c916f420203231c7aebe57a638830de6 0xa78951b6badc9f4740f6f456e9144705d5c5e4b2 0x56203c79c5d1bb09347ed101954e34c8f357f71c 0x6b9b5065cf7a431efe587699a4a39133f608849a 0x69953d3c7c62a362062b01594d7bb364c96cdbe4 0xea2eefb1676c06816c50a48cc6746f8661d05b27 0xe7c1a2a43d410c356b58733d8e6f661b3bd9957e 0x7d849cee89f563204af8b8e58fbeba13d18e57ae 0x59a118b68512bf8204421fad4cbb6ef0351a7c16 0xd408c892995c10b04d084578432eca4aa5ff89ff