ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6DBB67B02633
|
Infrastructure Scan
ADDRESS: 0x1c0f238dd792ddfd4665bd8e36626ff5426d5b14
DEPLOYED: 2026-05-05 13:03:59
LAST_TX: 2026-05-05 14:48:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Stack depth: 3 / 1024. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Verifying ‘require’ statements integrity. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Gas optimization score: 59/100. $line = str_replace(‘5C6A438B’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x27a4c98f719ffb8be66a7f4518696ff0b3d8cd3a 0x1158cf1f9571ad0f3bd1e210b585026a1a236f37 0x709d7c531339c98e3272c71dc1c3d206dba78368 0x5ecffc6af842e665b95ec889cea064f66000cfc5 0xfe7ab14f9f702b4c7be0a0cfdfb37876c3939e8b 0x90c3f80f4530ea5f2bb7cce513799423d21ab460 0x70d64802f891d4abc5e19699f18ef14bd39b5fc2 0xb28d8fa707e45c2121fc40993983d25ce0bdf1f4 0xc77dc138d3e89ad58321f71644a590575e05dc7e 0xf33d164880954ddc8e409032a6622c941067c803 0x240b58e4b8300b5339c5fbc307165b4a17dbefcf 0x6a2560f1e4bb5c4cb9baf63afde874d325cde419 0x49d1c6e8816648f96decc121492673fc1444baad 0x13a2fc86cfe93155e74d63ec40feb2e2497a7bfa 0xdf2600d1a4c23a4ec66726e6bcab40e7a808ee28 0x831b209bc085913d0677479b44b5c72ff27e8a09 0x6d3b06b488b6c51768f15de950d06b2138de45e5 0x30ff4ec03463d44d7b07737e88317e1cfe82a0cb 0xf670bdd7d198757f2774c45d833d263e7e16f8b9 0xd1ef3912f32ff8da100e02b06804073a31bfa8e3



Comments are closed.