ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-547F32B9EFDE
|
Infrastructure Scan
ADDRESS: 0x4a9ffb29c9113e3c390c496fa923fa900aed078d
DEPLOYED: 2026-05-14 09:09:35
LAST_TX: 2026-05-14 23:07:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 9A401964. [NET] Synchronizing with block height 54994. [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Mapping ownership-protected functions… [MEM] Stack depth: 1 / 1024. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] State change detected in slot 0xae. [TRACE] Bytecode segment 0x47 analysed. [VALID] No critical memory leaks during simulation. $line = str_replace(‘9A401964’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3ae20e6e8e7c79a1d44a9dd046b48f02b49cb92a 0x7dcc055718734d65de35737146ce0f8e2c83638f 0xf0eecef8a4ee71c891fc21ad30718d9c59919c7f 0x0c6a086d1533c03061cc9a24484c1673500dcd62 0xeb2bcf5f883b44b29f715d436913a188334f1885 0xb7b820b40e637343f0143eb93ccfcd4a9a912487 0xda0d61aa7633da2c65a33bfbc7d56fb7689e4be6 0xa5992bc551aff36388e0b3b733f8b2abc4ae3bd9 0xa13c09bbfbf610a6101f660a8f9f407d486b850a 0x15752850f2d02557b07716b0c7ea047445d861cb 0x4954a01f65558b500aa800c9950754c49d2444b5 0x1f7f04e9048953b9e1b9b2775c0f339e95919bc1 0x0051baeed2c069a418c5e86ed79cefce0d1119c0 0xce4b27a46e71c0ac15e89059573735377a7f5e9c 0x379674a24b99bdf80e3257bea259c5c1c62361c4 0x06e5b1d343b3eda49df160d0bab320de55859ae3 0xff49f7baccfa570811864185ab74a26480e13262 0x0e3f6c4f6d27b37b50ffb072ae22b9a23bb0619a 0x2ca147a4fa272919847bf8dd79c81b140b35da67 0xfae699b2cd84f2ef40ce44bd6b1110b60b19f1b7
