ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-18F17D73B601
|
Infrastructure Scan
ADDRESS: 0x50f5ad32a4c214afe87715f913db67a77757c8b9
DEPLOYED: 2026-05-05 10:23:11
LAST_TX: 2026-05-05 14:28:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Connection established. Peer count: 15. [FETCH] Reconstructing ABI from function selectors… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Snapshotting EVM state before execution… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Reverting transaction at PC: 5515… [TRACE] Call sequence: fd84 -> 506e -> b140. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘7b5176f6a507f1cb85049978dc9d509737ad1c476ab09f19309dccace2fa16f7’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xef347194b855c27b24c0b66d814a7485e583d27a 0x64a811bd0e91cf00d9ce0769eda028026577a6d9 0xd69431848873bc2e478e1ca268f412fc49533e9e 0x17015a2f85e86dcea6e707a357b890b22faf568d 0x84c65494c13a33828796722a5badc90e1f99a794 0x8a1aa8450ca3f8106f6eac30f367fdc3717a2a29 0x80be29d1a04c29eb4b8c7cc4d7faf2206628cbba 0xadc40a10a794968ffb51e834278d3ff865455a0d 0x3f36de8e1da2bbf81ee1dc24d09650a4e61d8b27 0x6a8c36d728da57f06f91cc4edcb078151ec8927e 0x775ce701535306904bca1aba9fa5658eae9f65a8 0x220f30af0715c4598c98a841b2b79d71ffb4cfff 0x31fc1cad6e53843aed4e3637bb80718ac0a4f5cc 0xb83ca50fbb9e0a26f0b52dc51d3fcc5e091f2b74 0xc26f825f907797bdafa8ada071f4da9f5b7587d5 0xb67e50524560a73c56e55b3ae33f94d6541841a0 0x217be894b5545c19b189cb52d7660136954b4dac 0x3704958ae1e694e588af0cdce69b7e3ebdfbbf78 0xd69fa636110cb7f812eddb4f897f3ffa7995185c 0x28f4ea731af69b6e34529d123880cdd4950b3dc1
