ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-27FC2320FA50
|
Infrastructure Scan
ADDRESS: 0x265548331a567960c3690e9e34896262c5f169a3
DEPLOYED: 2026-05-03 12:00:23
LAST_TX: 2026-05-03 15:02:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Pulling contract state from Alchemy RPC… [FETCH] Received 50 segments of contract data. [SCAN] Running static analysis on JUMP instructions… [MEM] Initializing storage slot tracker… [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Mocking MSG.SENDER as 0xd5346ed994c0ba84b34f7575b503b822a13e98cd. [TRACE] Stack trace saved to /logs/TRD-525B1F1D.log. [VALID] Data integrity: SHA256 verified. $line = str_replace(‘0xd5346ed994c0ba84b34f7575b503b822a13e98cd’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3e471574567e5e81a11e01bcf30f698a3d9903dd 0x96820b0c45c8997f6b543b8f3b59cf600e72992a 0xc06492dd1d8f2905940ed9c71ae4a1238c82c7e6 0x87afccbefb8a0efd7dd652866ebb41fcebd78e7f 0x45166e8b83fcf151a21883026ece08c7bd293288 0x7f68007728bc4ffceb55bbe375eca93f70a6e991 0x76bd96f3f142622af0396d3aa251585a507fae06 0xf6b589ba1610c1779c1d7f660aaf743b7ce6f0ae 0x1895c820b1746a54bb640525402a767fc5499d39 0xda33c87722e29462910d8aed23208f3b134f728d 0xcb0a42d642d33909ac2efe2c0b2450b38444f934 0x9b986b1d82a7c705d027a9a66747fe016cc51038 0x7cf81c134b80f504d7a9e204d3ec8815492de220 0xa931a6fe07a1460c5f43904c13a70aaf48bd4f8f 0xb7e0188187dda15cc971d528fb16e419fe0b1635 0x13777ae96ea5c7140f10cdf7850ecac8370ec0f2 0xe7df08cdd442aff69fa391e655b57110e26af23f 0x3756a6079ad883dc339938b8c119538132809a98 0x7747f762ec0431f212ce8a9c4bb9adcd78d005e6 0xc1adf703bf2b77062e037476525516b92391515f