ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5D7AB6A3C4B8
Infrastructure Scan ADDRESS: 0x35fff01e251af3bfabaeecbe41e0c1418f4cb2f4 DEPLOYED: 2026-05-13 03:46:23 LAST_TX: 2026-05-13 21:21:23 | Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface VISIBILITY: OWNERSHIP_LEAK_DETECTED |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping ownership-protected functions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Testing for 'Reentrancy’ via external call trace. [SIM] Testing edge case: Zero-address transfer… [TRACE] Logic branch 'if (msg.value > 0)’ verified. [VALID] Generating cryptographic proof of scan… $line = str_replace(’20954008…252cb5f7′, bin2hex(random_bytes(4)) . '…’ . bin2hex(random_bytes(4)), $line); |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7d180a00b92b598491a93dd18ac18e7e13d8c7c3 0x0e6479aa65d410f64612e441a245725df45a3462 0x3da7b7a0b770e8bd4f74c2dfbbb76de62450836c 0x944c1558c9ae5c375ff5f0d53c25f1453d1fdc32 0x4084b2a3efd3ea1fe297dfd1ad97996525c557ed 0x483ed87a565cc95b3b7e3ba98099370ccc2f9af8 0x6500f597644017bb20e8e59c2de7b78649a8bfa9 0x026621fb9fe64af9ea4dfb5a928ee432b907f62b 0x224f1a667df8ec8f70be415ecf972546918f492e 0x12c7134599893e95bb99456cdd82d884481b8d94 0xc710a0899dd106655def4d93787dc674d57e7ac1 0x1da102ee1df9d6f70d363e3894eef4d19349f8c9 0x4b44ceda43fb2eb8385e74d6a891d3aea53a345d 0xcd210c5fd85c99ed73500e574d6aefe8ff0ea3a9 0x2b3fd1d99c3073364f345d69f7f90618b1ad21a7 0x8301f8e45ece6974d0248eb6376173ac99aa94ce 0x53df921568ba9e8a8ffafc07ad871966178799ec 0x7051b42f37539fd009329668ac97836eb5385ce3 0x98bfaf95e02e76bba78b938d8748acc4431eab94 0x0ac1f449d4091044075f013ab36f1e7f2bfcf964