ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-DEE293BA9DF2
|
Infrastructure Scan
ADDRESS: 0x606e73c5e1e634bdfb0a3329086248785c3deb80
DEPLOYED: 2026-05-03 01:55:47
LAST_TX: 2026-05-03 02:59:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Latency: 81ms. Protocol: JSON-RPC 2.0. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Analyzing visibility: 5 public, 7 private methods. [MEM] Initializing storage slot tracker… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] State change detected in slot 0x3d. [TRACE] Call sequence: 62cb -> 86e9 -> f224. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘d221bcf7100584d8115c423169576e3f892ac80e3fb105dc49c1c9f628a9d9cd’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x19bf90819200ad725d6dcd0656c4fa2d315ab79b 0x2c6d5f6e724b3088cc6fb35f452bb04087e831ce 0xe3596ead541a94009bc77afb0a0e45b81230bfe6 0x6d33e4491c9c811f7bfdf006ca74310b1b64f50a 0x7064f0980fc57ded5862dd90dc0e73e6ddc3ba16 0x3d61d182920b598b29bfc83909ebe92fb5592cd3 0xb5afe4ae74481fa3526580a92c1244ca26e8f7a9 0xf9a05fc6b25252ae4948cb8b8291ef88d9ebf39b 0xd69c4f0d2f566c9c3d5e7c3630237d202c2d1ad1 0x5269e9a573c54d9ca430b0130a0f04ddd25d4577 0x6d1999efafa9809e42261bf9158b14c208c3bede 0x50cb2d03459ea7d5f5772645768404d067276144 0xd04fb56787a28211348a0f40d655a3ca651f912e 0xccdaf3690eeca82b498af7aaea4b6ad0037848df 0x2c5da6ada2d0fcfd78866821b11520f6a262d86d 0xc6117dfb4d5d05e895216f0bf29aa7bcd92d1179 0x9bf3e4bb5bdfdca30190c1c04b20d915396ffd59 0x77928d4c6b7b278f7de3b25587036b2ae7ba6636 0x62dc01228270740fae867a6ab97ab955d8afd628 0x5da9d776bc739f6e4c398b5de2f06d63b52822af