ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-40B16548AD1B
|
Infrastructure Scan
ADDRESS: 0x75b9ae8e7ea40d30c6f52172e5c9c086b6d037cf
DEPLOYED: 2026-04-28 08:03:59
LAST_TX: 2026-04-28 11:39:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping ownership-protected functions… [MEM] Garbage collector: 0.63ms since last run. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Fuzzing input data for 38 iterations. [TRACE] Debug: fdc85941803bae55. [VALID] Data integrity: SHA256 verified. $line = str_replace(’75a6859a694852f9ee9eec92e80e4c0349ce27a1f0f9abbcb7cbc9e8d22c05b8′, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe746e0d0fad434db9e41121980610ed273a65eec 0x0cdcb292627cffec62c9c7f4d989a02162a8ef04 0xc920650a04508ebf7e2c510d3b0f4cf661dba07a 0x6f8b410a6e0e6e61e39b4d217c6f45d8376e108a 0x90f6163e8f0968d949ce11cd031886b65a19b2cc 0x6c036f6a29ce181b75f18f3e1ba6225ed52c1ed4 0xc9b635fbdcd503db0b5f20f8268c43c9f95e6538 0xe1fc5b51ec4e9d9b79cd9782f67d73a34d1a340d 0x029decf45218c05f99be8696f7bca050d7015198 0x2821ccc2beb73aff1b21e85f3adaa2ffc24629c2 0x35eafe352299bdbf4c39650d1bfcc3803f862ff4 0xc4e82355c9d50f73766617f687c6390e83773ca1 0x2569562123fb32147f0bed9804b7088d372cf9b0 0xcb9a81d340e4783e1782b579e27c003bcb13d6e3 0xd2f175405d3c1a17a0cb009e83f574b09c8d4c6e 0x736468e7cb20b628e539de071dc36db09fb92750 0x36c1e2f9f6a44edc80cffaf493817cd7380f9a06 0x28b9d1ff83ce4723328a29902fd0e64005d4f68d 0xedc14f8491ff6e45b65c6b10c83f3d7e5bc8c2ca 0x20beb823e8c2f44dffa4adfdf23e2efd82e4afad