ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-411C8871F444
|
Infrastructure Scan
ADDRESS: 0xd71355c98155a2322f7341bf995012d0e8703589
DEPLOYED: 2026-04-30 01:43:47
LAST_TX: 2026-04-30 02:01:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Handshake with node 0x1e8f3e9e successful. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping internal logic flow and branching. [MEM] Virtual memory mapped: 0x0000 -> 0xb4f5. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Fuzzing input data for 40 iterations. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(’22ae2a967df11c650befb2b1feb3c8d68b2bc76ad0fa2363270e1235315d3090′, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1324476cc49a5bfb27fdbd322eb86f3284d440a3 0x0b2769bdef2186b783d75b72d365d438a07b2f33 0x230e8a6aafe93b8b20814d4257716e0e01cf82c6 0xea30f8e4899f1fe9cd4d8d25bb6750cc45b1205f 0x729b8461763dc13a9c6bbe17b9d94cd9fabda43d 0x7a05d03228eee1cb50bc9886a3d709fb6fa486a7 0xf6ec158f38e30a8fb9ac27b719cb05b8e37057e4 0xab531f6a9ea05b83e3fe6be0482ca777b495c6dd 0xc3fd0c5a89a982e75c733595c2687f03fb72e677 0x4e6ba1de1545611e4e7272cce668f5a143910a4a 0x8fad1fb7c117dee008087853fb14042cd65ed68e 0x8a52d26890b5b530cb4238a4eee4a207d9aab7a1 0xb33f1e736e8f7d8399f20216a9b8471411f0263d 0x05401613ca46da5c0eef5f408b1d8163d49f63cb 0x79cd58dd940c273a2d4dd18d87bfb520591303d2 0xb01477b4edeadc5aaa8dcac1f9c1a2b7e556f844 0x0b4c0cc49d8f69aa82fe09780b01d6af92eb1932 0xc1111570593c7447aacda19ecb8632f8c094ae28 0x542736119ebdf797e82eff6019f8acd350c428de 0x1d895585c5d4f560e29ab7f9bcf6a85f3b796688



