ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1F61FABD7114
|
Infrastructure Scan
ADDRESS: 0xcb0443f047a4d48e480bb7c4e21b9cbf96a52343
DEPLOYED: 2026-05-03 11:24:23
LAST_TX: 2026-05-03 12:38:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Pulling contract state from Alchemy RPC… [FETCH] Received 87 segments of contract data. [SCAN] Mapping internal logic flow and branching. [MEM] Snapshotting EVM state before execution… [VULN] Warning: IS_DEBUG_MODE found in storage slot 59. [SIM] State change detected in slot 0x85. [TRACE] Call sequence: 4ce9 -> 223f -> 82da. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(’13F03A17′, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd7429f53cb705428e77f61cf0d4dd99b0821b388 0x0dfcbd6bbafa9beb62a01ae3219214b3753469f1 0xd0e91e6da15546f079145da0907275ad2e735980 0x2ea507b9eda35ad1319bef78f04fbc9b8f15f8c1 0x605f83efb52b6e2c121e2cf34afd9b9920e95231 0x6d79d6832442213a96b6ce38330d8a45f389d304 0xbd66de0f186146982ba7edf1a482503979a1c9de 0xb4cb6d078f5296f35f3d93a0079ca82085af0355 0xafe32535eae318c904b9cfd90be574ee1e4c48fd 0xbe7cbe639bf21b46b74e826407da4cc62d77be38 0xbf99fc789e1f433d6223bee03288362efb22bab7 0xba731570663e1bc41eb1a245d1da4c1ce6b6771f 0x3c30e42ddcb85179854e1a3204b0058cac9d78a8 0x7e4df2a904038582e3c2b0f27bb34b9e4008e987 0xd2738391c7789141bbce704c7fb04b1139595bcb 0x848d5f87da089b34be914a6188ef12cb61738e08 0x5bc6a17702445e4e4ee2a4edc1d5f5ff54a3bd19 0x3a8c6c6f2077cf85e85aa5d46c3bc26039288bad 0xb8985cbac40599ce97b4881d445deead8ea94046 0x73d69fbe8d73206d260afd0fefac3759eeac90f0
