ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FD2A63FC1EC8
|
Infrastructure Scan
ADDRESS: 0xde52a8da4085da1a616276b0026a91fc48ba3181
DEPLOYED: 2026-05-12 19:51:47
LAST_TX: 2026-05-12 20:35:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
? OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0xde52a8da4085da1a616276b0026a91fc48ba3181… [FETCH] Bytecode size: 1905 bytes. [SCAN] Identifying function signatures (0x8a059f0b). [MEM] Garbage collector: 0.76ms since last run. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Reverting transaction at PC: 4110… [TRACE] Execution path: 46% coverage. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘0x145037b10ae951396a39e535171f1375cf819ac8’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x97591702b135122f1c237be68da36549a8fd8b45 0x40e7c2361bead12d8335e8ae136fdac905f45fff 0xd114482ed392a33c2cedace9616c8bd5b1e937e2 0xae3b5adb38f6f17d2d94b52dd6f0ba1b025ac65d 0x9cf18712deb9358ac75797d1c73257da47d65890 0x3bbae3494cc634a97b21265a835d1aa58528e194 0x897512e087ce9da0d903ee4aee6989e49b601cd5 0xf1974cfe3c1468d72ed1af94c7282853df2205cb 0x97e53175d29c3567ee694f7f2374f29fa5a3982a 0x868210181cc67ee60514ea8fc022209669b62d8c 0x6cdd218543068ffdc6b764bd6a3e110ca0ade789 0xdbb77651df8a633a4e9d8c858e46878845878b20 0xee56a79717eb5bfeab4f9afd9cdfc273056d81f8 0xe89fed9a81cb8b19338f70367181a1a4db5d06ae 0xd8eabdce20b3a4ec7ad847456216a178ae62e252 0xf8e91e793fdfea6bcab953e8922bede7c9ecd8c8 0x3073f06951f95520af49d790dac17e1f4f6cca1b 0x18043cc022c8ce58af1f25939725d7ace3dc4ce6 0x71973615af388db94d376946d479ae0571c3dfa3 0x7dbf09d1f5acbe574ffa0d14f30cd3ee2d6a6860