ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A96E5CC63C76
|
Infrastructure Scan
ADDRESS: 0x0225c3ee15f4083aeace87e990f4c38396a067d0
DEPLOYED: 2026-04-27 23:23:23
LAST_TX: 2026-04-28 00:13:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Active_Trace_Protocol
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connection established. Peer count: 41. [FETCH] Entry point found at offset 0x80fc. [SCAN] Detecting compiler version: v0.8.32. [MEM] Initializing storage slot tracker… [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] State change detected in slot 0xa8. [TRACE] Stack trace saved to /logs/TRD-D8B3A13F.log. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘2a78bea1…54a0e8bc’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc2bd4dd68d80e2e4a1b1883c75594380e375b219 0xb4a5fd1371073932d95090bb0cef553050d3f48c 0x8dde658ffacdf1024db86b010972165ee6f11fb7 0xd2f2103d99c43da035acdc0c37b9c87920f9f2ef 0xaa935562071cefb2ab1538437190764ee0c17eab 0x3fc1573b22bd9976845aa35881b4b5d823a4e921 0x04051787e5202f71431ce2d32ebde0cd398de370 0x940ab549f1a32711e405500bbab4669fe6ce47e4 0x314748d38a4d1f8abeee46437b11031caa41a27c 0xeb167dd2a4fd89b88d1bd0b50662c0953b499305 0x0f1a7605c5d2c3e8d16165e374309283e9c6705e 0xf5c6d4dab78de928a365d81dd244569ae91942e9 0x4fdc4d73f6d411158b6e49cd91cf1b4dbbb06a67 0x7d9286fa19250ffdd9b1e31dc82498858244515a 0xe5bc176a225c5cd8134319dba66de346ecb98900 0x1aabbd49709cf93dbf376c02f03551143b6d22e0 0x7abc7128cb091d40c88509dc9e05e94bf9219107 0x3d4a569d58775fdd82ade5be35af3ad7b31be888 0x3acf630a625ad483415228faae718d8c2f9076f5 0x7fc250f0afc02fcbfeaefff1241c24e352a16073