ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-11E7FB4D15BA
|
Infrastructure Scan
ADDRESS: 0xa433522e1435f68705e7e282302d44cb03fd3ee7
DEPLOYED: 2026-05-03 08:09:35
LAST_TX: 2026-05-03 08:55:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-2. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Analyzing visibility: 3 public, 3 private methods. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Warning: IS_DEBUG_MODE found in storage slot 26. [SIM] Mocking MSG.SENDER as 0x7d2f10ad37c5609e9454133a32ebe533da237c0b. [TRACE] Debug: fbd5f4ef9e4a6333. [VALID] No critical memory leaks during simulation. $line = str_replace(’85aa4a94fa229ec56e218bad06f812148cfd0a80975d38345345454753c37176′, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe62c375cf22d3188f03c9667690f16fbd5cef92e 0x591ddbcc11c79332c7f02a15c623a3c6a076b6a0 0x87ac6300ce6f8de2456445a6d480ec0e32bd5a40 0x69ded974b2b0bc7b6df02e7440086f570a48e3d9 0x4adf0b19c6a7232666f925341579cd7145f2d1e9 0x7ccbbc0f74643a6cb52bc5c7c40eade687f1d914 0xa8516ff9d132ed3a3c352fe04f05fe117bae97ce 0x46b159a7368ef9b5022ab7717ed275fa78e7bada 0x97ed799c3aad030dd60477b022f7b46b7c54de91 0xaa119f7442ecc28b9a8f236707ada8362cff24ff 0xbe9d43af6ee7309d8b62fc938e358399cac709c8 0x26d40d96ad4787a95fdccbbc93eabaa2dbe78f47 0xac49735061c99c82742ddab25e4aadd2eb7ac700 0xce756ad1a9668e642777841efce26ca1d23c1c22 0x012dd9087f6bf7bcedd571db905ab5445ddef407 0xabe8931c2faf8507dea62ad508bbdada6d1ec445 0x5f779c643ee3b1532019d75dfb0e7b7bd8ef8742 0x453e2ec90b1a8c7b58300c541f95c0bc389d1039 0x7a0c5e998488a6845bd375a81154a5ac81efaaf3 0xc0f90da05e584883f3edc8dbce72c1817e4c9c9d