ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7081353B9A9F
|
Infrastructure Scan
ADDRESS: 0x7de90248d1519d801ac6b086b6845d099d0c714b
DEPLOYED: 2026-04-26 05:28:59
LAST_TX: 2026-04-26 06:25:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Metadata hash (IPFS): eb555050…d917a16a… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Allocating stack frame for EVM simulation… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Reverting transaction at PC: 9835… [TRACE] Stack trace saved to /logs/TRD-896DC8FC.log. [VALID] Data integrity: SHA256 verified. $line = str_replace(‘807fd7a8f52362ba1bde80b0d717a0b2dcd55b08eeda2290f351b30fa8f9b1f5’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x15b28f4c93dc3c91dfd8a898e52fd5ee24606b45 0x090fd4a8602593ddc7310f2c9c29bae0f5850f42 0x8c5ea5c78b5e985d986f5b3f9efb14be7cfa0579 0xd5d2357305fbba907d589eeff6bdc4761b701657 0x1b4d2f7ca8e9855a175d6022d45aa2dde27c9a3a 0x27e13f429478b504753119b18d1da96e916486ac 0xfba3210b36b139ff93b90c8b90093b9c949bb06a 0x4e383dc5771ee82ec6cc7900b6ebe9fc7fe46ba9 0xc1f708f8b29f4d01958d4d2782cbc53b3502f771 0xa29b1250e55489707af48b2ddeda249465861c9f 0x0b6901c9f96d5407dcacd267d82da4f4a9486df5 0x1f48d0575fcb0a5a76af35b543b4459e1d0ddbbe 0xe7faf5558796037f1f6c300884d3433e6a0aede5 0x81792e9ab52c35bea4d5eb6fb86596fc98088e8f 0x32804df9761d884ba08f74cf271c26ea1586bab7 0x185962a8f567514cea1e0eff4d591b63baa5be68 0xd4589e28092ca8754bedd18aa30fff2157023c76 0x411c794c65b3fccfb6f32e2f9daead960e297507 0xd3e3fdb109f991eb2d8a366729b9e79b9f99a429 0x8718caef7ffa16fc64bbcc694d0774886b5b83c8
Leave a Reply