ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7D212191BF90
|
Infrastructure Scan
ADDRESS: 0x6301bf0d72a38cbdf0aaa37ce638043215d80f4c
DEPLOYED: 2026-05-09 18:23:11
LAST_TX: 2026-05-09 23:19:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Connection established. Peer count: 39. [FETCH] Reconstructing ABI from function selectors… [SCAN] Analyzing visibility: 5 public, 7 private methods. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 29 iterations. [TRACE] Bytecode segment 0xa2 analysed. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘d786b758ab0a1468b242cbdbfac62934ddbe778d283ba5c8565a97674ac27ab7’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5933108a4eff62294b14e6dd49d0cf9f255e2ee5 0x83014b77faa08856a6add7767f3f05ab37bf14c7 0xfa1ec217292db621b517510cd38ce44d86cb6d1b 0x9b8a29fd514eeea87ed64363ca2eefde1753a018 0xd1fb984da6c44f731aed7df6bcf61b982cb4b577 0x9bc2254fd2fa7c82986ba31928744db32f66747d 0x044a1087abcfd1a8dd03137702699b55b18411bc 0x8f9dc20a85b898aeb93b5eeba5f4973c1f022e6c 0xfcdda6f3501ea69c021e01cf48d5580798a72332 0x9884baffca1d0957778e14283c5dfe744a80f691 0x63663835f89ca592e28a4f78fd171832089fcfb8 0x60ab1ee0dc94c1e2cd3e7899b5e0a76fc554c780 0xdf97f1c15828871bc7e424e4b3ea2123f646d3db 0xf76790defc56c781b41c5ae1708d3a72e4341e87 0x458b37e45be31f7a2ce79488a4020307d15acf86 0x6b1b5ff2f041487dd4a33c7df419b26d9431d3b4 0x278c78e7cb00f5ba97674ba5c88aa92b7a005e9b 0xa478d6e9df86bf96739f8e5c4250e2c148e26758 0x18ff5527a0ad753e31e04ac53d73bbec0144d186 0x72ca7d032fd0a6cee9cc884761d1ba2f9a9a68e8
