ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-ADA01B8DC5B7
|
Infrastructure Scan
ADDRESS: 0x3f1612637f2cc5ba4a1ff864d4ad4d553eac2869
DEPLOYED: 2026-04-30 01:50:47
LAST_TX: 2026-04-30 02:55:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Connection established. Peer count: 74. [FETCH] Entry point found at offset 0x19b8. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Allocating stack frame for EVM simulation… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Mocking MSG.SENDER as 0x61d8db83ff27fcb63dda00378a70bf2987726846. [TRACE] Debug: 65c26a4947e8643b. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘B6AF5287’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x061866bf0c80f8d6523e6b7b980b8668b5ecda2f 0xe5b628bad15983dfaa5356489a3be5e2e2f223b6 0x37c43bd11e21ac06cb1fa0b3f1c08cd2db702b74 0x64876ec4bb025947fb1e0010ba60fe21715df332 0xd484d7c16e185f69dbbb2eec71159c32a42cbdef 0xa143a9cd283b1dca7668a025a1d44bdc2e91e09d 0x64c62859ce56fb9cc74c253ef59f7bfc67d9630e 0x46b2b5c6a0ce9c3953f25219d34b74f6858b0a27 0x943848c7beab941d214eb74445219246aa33f721 0x655d37556a3e922133960b02bfbf4d09ac2985c2 0xfb772965175deca69f73598d967a5266e7708c5b 0xd719f95cb8f34295c85cf6b53047aedc74dd219a 0x14b1e2e6577f49c6242533119452c3ca092fc9b1 0x74f12467cb53478083b8748cebd8b2d53be52c61 0x7a95864e81b8f359ea335eb176676ad2f525075b 0x1bf8523049325419f94e10881e1d7dfe97f94058 0xc5baa7453dd463458ab4c6319b3ae736b4263422 0x40102eaf2f5c658cc35d1589cca204ec8d9130f0 0x0907df010a0fae300717e05b508d34cc7d9ff1e1 0x22aa279375f454f4c7b4e281e4d18d17c5d5c167
