ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-238E7B85A13E
|
Infrastructure Scan
ADDRESS: 0xa6e8451fde16655e3132d1806537b7f9f2cd2078
DEPLOYED: 2026-04-27 08:32:11
LAST_TX: 2026-04-29 08:27:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Mapping peer nodes for transaction trace… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Initializing storage slot tracker… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0x6fb0b869a7db3ac7565662229afc57a14450d6f2. [TRACE] Stack trace saved to /logs/TRD-311A65CD.log. [VALID] Data integrity: SHA256 verified. $line = str_replace(’26eaa2c6…09b52596′, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa79c9635c10829ab9d4c0491c826dae4185c0b33 0x4919b6bdc611cc79aecee135c0c5b1d187573532 0x8582c031841c513529f546b61a334e878dadb53c 0x850af98cfe639bd87f7c5d6366628fab73104aac 0x9b64dcfa712b18286c07338363c4f6c11a228f17 0xf5e5cbc6d84e591e09432a1a86face94c3e12969 0xbdcd3f65f7cf05095b8aa93ad1ebce1f3ac3a0b2 0x185db2c7f5577fbc44561ec9755bb1955fcf416d 0xb15bf45c4f6b2497074770388f133253ec2dd3f6 0x29e044d60e9a9613995cbb854f8ad0c46aa064d9 0x864b48a38889fa39bbcc26e248f5e5592a62cb49 0x1b5b89fca222b98019a2427570a8939291da205a 0x5b0c23ea326757be75ccf9a6c8fb0b20c67250c4 0xd783708ec8e0cc9b646d256f5845bd510f19c859 0x08a259ca5a48ef4b39d0e6e9762ba52af0e3355f 0xa63ee853088f8772fe8f6f0e9240b6213380783a 0xeef5170735304776fbd286827757ccc4b6d93b8a 0xef00ac71a04a37d58d003b2291a775cd1221d59c 0x12f1dc0c74cd978154d175c3ea71e8d16e5cd136 0xcd374989a3869e40770f2a47f704d2e9c2c3a610
