ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1ACB48943BDD
|
Infrastructure Scan
ADDRESS: 0xa67500b9097a9bc7064dc3e4d9a14a19c470445e
DEPLOYED: 2026-04-25 13:56:59
LAST_TX: 2026-04-25 14:11:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Fetching raw bytecode for 0xa67500b9097a9bc7064dc3e4d9a14a19c470445e… [FETCH] Bytecode size: 5166 bytes. [SCAN] Mapping ownership-protected functions… [MEM] Garbage collector: 0.90ms since last run. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Reverting transaction at PC: 8228… [TRACE] Call sequence: e6b2 -> 462f -> ab98. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘078aa9d67ad44cf433787e6e6d923a9b52249e00ccc595b66dd15e71ea2ae4bf’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd71a3765b8368d37a8bfaabbfaa6d475df93628b 0x38daa3fc4b1e5c02742b67f241b27dceb8bffa45 0x154c2beeada1365ae07dcda4efbcdc8f9fdf799c 0xc1f8e39afadf29420a0b8b27ed820dddb1f1f0a8 0xb1f6bc314f025c139d1f5415b4f5e48dcb9a4923 0xe6d29aee20854eb80d1611198ba772f3033c1c21 0xa181e023e476a759f2423f02d61713db606fb45c 0xa164eb53628d449a0951a191f993dc1ae7bf94cd 0xfc97754a196afa3b56631243bed345b9af01431a 0x0764ff270aaceda56d0940327c50f8a199573a9b 0xc3e5f1efc4e973bdf5002ba46574afef84366d73 0x2f8c355c896fd2cedf85a2bdcf2545a6b2cdfa5b 0xafdcd1281fb88dc6cc3b45845e76b73f5643a5c0 0xe972c22d75aabadadf073d4f99f1f2cde10b6e01 0x859eabef702fe78bbf8c695024804cdb73c55c67 0xafa26797eb715e633730d3024e507cc2552868d5 0x0787d84c845a45eaf9139abef04c0380d3a3dcd2 0x5f8e7d750e75b44747c058a204d8dea0d18fa5d3 0x93e7f2c35c2c975125c5c00759ab2c97edafd49c 0xaf490454ca2d36af061e7c1a777a26fc0f1d92fb