ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5B20CCFBDB87
|
Infrastructure Scan
ADDRESS: 0x41cc011e768b2859f2aba42551762a2a17b26fed
DEPLOYED: 2026-05-07 09:42:23
LAST_TX: 2026-05-08 10:16:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Detecting compiler version: v0.8.16. [MEM] Stack depth: 2 / 1024. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Testing edge case: Zero-address transfer… [TRACE] Stack trace saved to /logs/TRD-C351EE87.log. [VALID] No critical memory leaks during simulation. $line = str_replace(‘0x5a0661911ac9c3d20ccba9f55b96feebd5d41f25’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe240e15aaa3ccf054dabb600aef8e48a25932a80 0x33d244f841ddccc070f7e50eee023879598c3275 0x777c7a3210fa2bb1db2dcb8ee74203b6682fcd71 0xa6701fbe7d45fb5ee7b9f91451b8f4fdfb3b64ec 0x4258d299f566896c6bdf7a01a162e1d3cd695233 0x1eda7c64527656a2ac526ace890929fdcc5af6df 0x63663835f89ca592e28a4f78fd171832089fcfb8 0xbe2fed4741d3c08429f0a1416491eea8a73e7080 0x2ef1bc7e94593bcd17718b8e59dc82695aeb4c38 0xb3b6f503cfe347d1763458553bce5be16a7a06b7 0xe3b512520539f7b85e471fc2bb7ebbec506c202f 0x3edf9c76d196e36526c22c5b06c950b9a122128e 0x9a4944a7001fecde1303c88e36ae787a090fcdf1 0x11522e7e1b29e4f6828221662c96b7789ccf20e9 0x520b10b1927e71c68ec3c22864a54c4911262374 0x7fa8649d926a7e4712c836edf68d19ba481540d4 0x5acadb1d5407332eb8210de97f1910dbe39608df 0xbe5b499eef59c2bb5270b48410236f681e7dccde 0x2dbca730d7aa430c81c90f277b3ff58bc512171d 0x49d7c15ffdebd6f3f31f4877dc8a6cb47bddb16a
