ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E032F4515003
|
Infrastructure Scan
ADDRESS: 0x0827d38ce0765e6d05e475646e8b837db07abee1
DEPLOYED: 2026-05-08 07:18:11
LAST_TX: 2026-05-08 15:26:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Latency: 70ms. Protocol: JSON-RPC 2.0. [FETCH] Warning: No source code verified on Etherscan. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Reverting transaction at PC: 1769… [TRACE] Call sequence: 1e18 -> b9be -> d2f2. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘8D1357EE’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa9a1d4cc7fc8f258645f27a9170f536a8549119d 0xa0a3726f42378df99ffff681fe4332e290e93949 0x1f7e81fb3a850fd22bc69a1704402f6b2767b9e7 0xebed0eb7c9ac1b403122374220e9e37b73b0ee62 0x4b841c23e79b3e9dae15dc3cb5360c193704d201 0xdf22ce0de1c93bae44efc948770f65352631c403 0xe0890720d206c57d97c7cef3cd91607be227b99f 0x866090233ba6a9fea5ea20a6f61b42c8859397b8 0x3ce97093ac5fa78b4733850699152288427c6b9e 0x0aaed2e098a492efa13b4e9d322f42042d3ab8fb 0x991bfed1023bfb97d976c0219f664de384fe1d67 0xcd6e37b8296e9650bdf2f4668c4041cb68579ce1 0xcb542fd60fb03c9de4242566e323ec3a706139e6 0x81ecf8aad1453dbe88713f72654edf8c6d0eaaa0 0x99ba73196f7d010810253d4b1085521733b7e84f 0x37e2c62a31d2b8cdb22f66c83aa02863acb2f776 0x16d860eb6068dc6f45166c879b70374f566ad7c2 0x888d665fc3e388238f3d9fc4eefc27d740cb6126 0x26e976da07961679369f2112357ddf038aa675b8 0xab1cdf7597ac9e962f02f7fbb0968be632b28edc
