ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5B1C6F4A117A
|
Infrastructure Scan
ADDRESS: 0xf6576e0d89aed6b04946d39fd828d6418282cf9c
DEPLOYED: 2026-05-07 08:15:47
LAST_TX: 2026-05-07 08:55:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Fetching raw bytecode for 0xf6576e0d89aed6b04946d39fd828d6418282cf9c… [FETCH] Reconstructing ABI from function selectors… [SCAN] Identifying function signatures (0x4ecfe6c1). [MEM] Tracking pointer 0xf58f5fd8 in memory heap. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Fuzzing input data for 18 iterations. [TRACE] Call sequence: 4ead -> 0741 -> 65fe. [VALID] Data integrity: SHA256 verified. $line = str_replace(‘0xdea97c59bd8e6a3b6836d3287bb1e5ed8a08716a’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xeaa21868848ffb084e3506764df00ef5010f872f 0xbd4eeec0701bd80ca27e432dfe3a097a2a0675f5 0xb0c794ebc51e179305454fcf99be5b7f58f08456 0xdbf5137db9f42c10e1054309c90f19f0969af118 0xe617b57af2d6e6660150328e0e7370b40b92839d 0x3045a82e303bbe1083478204730b0b2c2e7de49a 0x0c08c707c9aa2968f72002126046d4d4bfdbdb9b 0x6e17ab063241425fdcd8e2c92ddfa1f5d7dc4a4b 0x9d34b4c8acba2544cbf87e96c072a3cd208f199c 0x1cde8ded1b99c8e580a88bba3f3b94247c69eeee 0x6f5130be6c2f6b3d368a4c1d5dfe4ce65ba09761 0x0f9808bfffd8674f88949dd80922d771a6ebcb65 0xeee474152dbbc11d3df17cee57ca0b6e136c855f 0x9141cef4e70cc627a6b2108de372989eebe73efa 0x12ecf84681212102dea5ccf8b5ef295bf3e8b1f1 0x12fd4ed3afc6472c346b3d36a3c2a80e81474657 0xd113344cd95dc8298005171187a38e9ac06db54e 0x96f67c4c422463685205e9cccbca68071bb06345 0xd7541eca0823665afae12fd9aef1bc1b1d72328a 0x9e22903e13c28f615940850432dcb518719329b4