ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5AE7D756ECB0
|
Infrastructure Scan
ADDRESS: 0xf6d6c3674b617c548249061ac018f43188c874ad
DEPLOYED: 2026-04-24 16:42:47
LAST_TX: 2026-04-24 17:40:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Fetching raw bytecode for 0xf6d6c3674b617c548249061ac018f43188c874ad… [FETCH] Hex dump completed. Entropy: 7.13 bit/byte. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Virtual memory mapped: 0x0000 -> 0x4a48. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Fuzzing input data for 90 iterations. [TRACE] Execution path: 89% coverage. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘6ed4587b30a7a99926530d4319f33a6791dd16a1eb36d5986ab5afdb8f3b02c3’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7529dc60e95934c70d8a0f59f1f6cc1b4f7cec16 0x0fce42f19e6401a79d661df13ba84dd65fa7e6d8 0x1ca36cfcf45d03721b1556c1c9e6012500130939 0xb1492a2d4fedd76eae5003eb95d8e02840bd353e 0x0a59fa3219a46722e91fbc7d5d59b1f141d14386 0xedf30deb65573b524e5f43f6003d375bf7380b50 0x2cee4d7187eea96974eeedab8aaf68bbc9dd3e2d 0x56d335491d1d55790474660f3d2a0b77d4658d36 0xd09185df1d4b966ac559fa72ce5e6adf5dc5ffe3 0xcc41e517770ef9af8cf7e6cfbe9cea8069cc432d 0x6deb7d41f1e72b6b10f30c47ca8a640bc22f4481 0x51b5a0fb4d75a775b974c7edc0f897c501a5bee4 0x71f73c7d262a32be0818db8b42e93f7e016f8ebb 0xca94395469a88e9cac0d5e5e308910e298270d30 0xc1f8e39afadf29420a0b8b27ed820dddb1f1f0a8 0x468eadbee5e143d7806911f9325ffb0eec239f15 0x52fd1233dc975ca98be69ad4e8830e55cabc3cc3 0x3178234aa34737eec24bbe75aa304cde36ba88d1 0xdccf6426a315128ab0fac5268bd6fd9ae39677d0 0x7cb2b1d087451e3554fc7dbb8c1d9e58368d7f48

