ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0A0C9FCA3A7D
|
Infrastructure Scan
ADDRESS: 0x4c0201aa8444a2ca5b1e11447b899c3b80fda764
DEPLOYED: 2026-05-13 12:11:59
LAST_TX: 2026-05-13 12:52:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Latency: 77ms. Protocol: JSON-RPC 2.0. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Detecting compiler version: v0.8.68. [MEM] Virtual memory mapped: 0x0000 -> 0xce54. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 26 iterations. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘6d9f7f15…139f1fba’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x01fdf8ec002c2689b6b520b6359287e3d6b9b87d 0xf89013aa2fd0cfc4901ac989fa3b41120162ad13 0xe4a01aa1fbdb77f753e5e494a49bcdf3715cb367 0xe27af1b5efac4ce780822414073e1a1b2a335c4d 0x448706431f01cb4cad1d69ba0460b69232025516 0xaf3b229450afcb489b7c4ba464fd55e0a715bdc9 0x5a9b42090750cdf231de603ee5e30c0e9fa46cb9 0xad9a16ddabe53f5e8e4062d3a842068f69f04dad 0x4d5a6c4e78ee4c055e9512a17039d84cf0cb271a 0x9a9b3c1ce9228446bb4a766db49824bc74de69ec 0x083163be9479774e429631c178afc758f7891fb8 0x31ee5d7bcb26ebabd922a185a0787416ba9b5eb9 0xeaad376694da4a67978182a0acf385d4fc5cee2e 0x3d29e9b039dc1ea893a97fb91ef070e0fe7360dc 0xc1d68306bc156e46548acc9ec3df07a67e7f1638 0x703c53f37f0e05f27e153e4f16f2f0c675aee24c 0x74981ffcc25cead3e476fb3f670c5abf9779bdbe 0xcf671a16f645972a567a11682fdab9d24d90f76e 0x5b032396a58a1b85caaa03e821e6bcd392eed83f 0x0d13f8d54ace50d57da39e43b7b55206f15a869f
Post Views: 1





