ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C7B7ECCE51CD
|
Infrastructure Scan
ADDRESS: 0x1b32b23e1a545728bbc74b4ad430240f3aa42041
DEPLOYED: 2026-05-09 09:24:11
LAST_TX: 2026-05-09 10:05:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Fetching raw bytecode for 0x1b32b23e1a545728bbc74b4ad430240f3aa42041… [FETCH] Received 26 segments of contract data. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Virtual memory mapped: 0x0000 -> 0x80d9. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Balance check: 6.96 ETH. [TRACE] Program Counter (PC) synchronized at 8282. [VALID] No critical memory leaks during simulation. $line = str_replace(‘b8df883cc10442b8dedc7f6cf6040b9c91c5d2fc155cbff1d844a7f555f6f9ca’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa6354ec6f272acb0563cb9474a2a867461826d95 0x4ef1d816c7c99aeb6c11de2dd1f77d89b121e8c3 0x2e2fbff4440e77888da4f0cc7f5677a2e99d6faf 0xe260a63b6c5a87d157c71ad3b07771ce94c8066c 0x01c3c5f64734dae32242166899b30c77ef1ebf78 0x570c8cbd3756c903217613b02f383b233dd1b022 0xbb6f34d22ea4e9f1819fcae58988a4b5eb37976d 0xf71a9877aa0cd42ae5c9694c2a3228b7ce8d7329 0x7830e9b636e734f75c42597fbe2e051638c1cd6f 0x38bca071c35f302b9eeef86b2e1ec97ea6eb039a 0x2e2d32ff827cbb99b1d595026eae1a057b01e3ac 0x0f3ab269ff23df43a4b8004303c147e122428f8d 0x26bd0b6cc905e4ee028f698c54562521bb903662 0xbe2915a28197e1a9df2d3213e58a7dc9ff6e4c6e 0x352831cd5757c6e96df9d53c414b5ea2b75e7dce 0xdc9c71d2bf4f616d86d2a3909073fdb02147da47 0x51f580e67401f0ea6f4ef545dcbfa16bb6288db5 0xbd41f104946346ff26e0736009a35f1b7d1b13ab 0xc12e24f82b1e4fe09f914486835f0024ee8630e0 0xcaa498f6bb62a4a286f7593602157ba255442a28