ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A7C921193DA6
|
Infrastructure Scan
ADDRESS: 0x447567e649d47d2c34319a17f0a0ced75828e555
DEPLOYED: 2026-05-17 22:13:35
LAST_TX: 2026-05-17 22:36:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Pulling contract state from Alchemy RPC… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Allocating stack frame for EVM simulation… [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] State change detected in slot 0x04. [TRACE] Stack trace saved to /logs/TRD-8C1BFA70.log. [VALID] No critical memory leaks during simulation. $line = str_replace(‘0xc6a118b0c0951517416745e9b59cbb953b703040’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3fbf5373354f757506b004aa02cd43b793a0834d 0x497859814916187584ea5efc26d85410d52acf63 0xe6d6d237fb2d074a822fff1493d70e314bd5626a 0xab6d669d8a644d8213d56d464fbb466ff29fd18d 0xd8e7f1b63d8d8fb5dbb63bf0236426cf4ad217ca 0xa569b2792a11c64b9be5425fdc91b2970ceea486 0x3f490e729d69a1c625ee3482567a4ef15b2e7184 0x23aae4778932d2c2149da74bf958a71e095f9c21 0x4ee2a04be114f506137d07e3ae2dc1a6adc4b8a1 0x85c75d6d06d2c32c93528b814853386c954a4bb5 0x58b0cf84882598b14be65191f881f0054774e15f 0x0ac754216c0e6aaa1503fbb2f94aa8ed32f1336a 0x3bfc517d317f2dc6548049ba1b3834b660d63d8e 0xa585e381648ca387214d4d4c73eef600fe9250a0 0x448b98ce4da3811e8da0851bf853f8e2d0535f06 0xe0371c97c6f21121786a698cea07e084154413d3 0xc0eee484d6372c879b2b96c2c41f13dfbf35e437 0x4bffb1b97e26af329e892f44e8395e89ab1ab009 0x0c998ec2278d1c46c0022aa55b09c609e653aed3 0xc661668a098e8f6043ab165d9924f1fa1c38fdaf
