ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-426A20AE7649
|
Infrastructure Scan
ADDRESS: 0xfa3c75f3f849e9475bb026f70b51be27c90467e2
DEPLOYED: 2026-05-10 21:09:35
LAST_TX: 2026-05-10 21:16:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 57. [FETCH] Received 47 segments of contract data. [SCAN] Detecting compiler version: v0.8.42. [MEM] Clearing temporary registers for deep-trace… [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] State change detected in slot 0x46. [TRACE] Program Counter (PC) synchronized at 1085. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘cb3aff1a6eaf49cd405270c76f1b7b11a58f30a94cbbca8a9f0d454827daf871’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4ee76a2e92f87d6d6a08cc9882f593d04883f9ba 0x0f81796504ed100e4c6aaaf8cf0fdcc5f65267b5 0x850dd5eebf5cde04c08db12263d7a480e109aaf8 0x2778119b052e20c6d0401313616ca9050ba12253 0xf37006187916764dcd979565ddbba3038f7f76fd 0x4d56ebc93cc2725e9ae99842f8778366d8312924 0x3d64c2fd6f77f951cabe38c5390ebe0c914e6cdb 0x413b951adfdc333aa0d1280a91cc082b4a569261 0x165a0cde9a1d3a97ac4cf2030f0cc6229647b4d6 0x3b99000435c797ca4af617534e8ae680bf7a9ec7 0xd8e058041d50032d8e30b456219ac2b275ee5fcd 0x13489078dbfbccd04ac29c18183b987685f2138a 0xce5f7cc7bd5c248c4dc1dceb1b3b381ae2490b8b 0x0366547c6c2d537e0f770fae3bec5d2a5dd94fec 0xecbcb8dd65d4fcb93ed24d9e91f3dba3b1e25799 0x6e63d5c56c8103cd18beff74b923610f0bdb090f 0x6c01ee634742748348f0a47abdcc4932e2e29d41 0x5c0179532dd7d5d19d5ffebc053bb2d26a065fa9 0x78c2e77730116628c28873f1345ca8a32bbf3b78 0xc01ed9e31bec228d307a7e24aee190783be128bf
