ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D7AFF623CA8A
|
Infrastructure Scan
ADDRESS: 0xc9a0038e65a83170b72265532270f3399a79105d
DEPLOYED: 2026-05-01 21:38:35
LAST_TX: 2026-05-01 22:10:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 84. [FETCH] Reconstructing ABI from function selectors… [SCAN] Detecting compiler version: v0.8.66. [MEM] Initializing storage slot tracker… [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Mocking MSG.SENDER as 0xf96064ee91f9d227ceb9708762c93fbcb04505a7. [TRACE] Bytecode segment 0xe6 analysed. [VALID] Gas optimization score: 38/100. $line = str_replace(‘808081bded646084642d4621811f3429d0a06fd4405a46e3eac6de5d3d424a8f’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x33741e9c33432f1b629c76cbf5ee660cde9acd2b 0xa9035ca05c49d282c1b09a52aef7af2bf4a548e7 0x7baa389a0fa97fe65c1c216231cc13423a20dc6b 0x5bd97db8a11a4aabaedb133a99ead7b03a56f61b 0xb71ab0e9a24fa57ee4a8f7556abb99ac319bde71 0x23ebaae54db96bb7d5010fee4f508c074fa0e217 0x2baa59b80fc8f0b487883f01c99d1e8ddfe388f2 0x329700a2484cdae9fe0ee4bf6f3b1c1dc1487192 0x0e670cf80a1e4e044b2b11854b4ff4b5fcaebdee 0xca6f67ae992cd6440fdfc36d7770ccf1045700fe 0x4475b22f6e258a344e551e80213ee0e61898de2b 0xa0c6e4473b6dd38f84718e6f79bf6ceef3233df3 0x376d0368863e76059a789406a0fbeb3ac3c1417a 0xa44aa528a2e824b6f7ebd9a0a31889325e7bace6 0x6b907589d355ddc3251e69723f181ef311d5dabe 0x9f504eb62b426f20e20a144c89517f75597eaf5b 0xa5c70ce843ffe64bd0439e69e13ec59372d451e4 0xae1d4445fac4a84a731ce517c74aea02b76efa42 0x9a361113c12e4e27d8d577cad3b1076d69e17da5 0xf769210395743a23561a171fac391689b1cacfe7

