ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2F279101BE6F
|
Infrastructure Scan
ADDRESS: 0xac510ef9e1ee169926fae7b68b7c25614f3f93b6
DEPLOYED: 2026-04-24 19:59:47
LAST_TX: 2026-04-30 09:58:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 4F261D6C. [NET] Synchronizing with block height 83772. [FETCH] Entry point found at offset 0xe218. [SCAN] Mapping internal logic flow and branching. [MEM] Virtual memory mapped: 0x0000 -> 0x762b. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Reverting transaction at PC: 2794… [TRACE] Execution path: 16% coverage. [VALID] Finalizing audit report for 0xac510ef9e1ee169926fae7b68b7c25614f3f93b6. $line = str_replace(‘113929da…64a9bccd’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb35f2ee104202bcc81c0197bde2dc6b25feafd8b 0xf3cc11ae91437b54ea8e121910df08510132f514 0xae42f183554d369ee98b7b1980bea3761f47abc3 0x74cd11b3d04d2a69ebc4c7cac0d3d503ccf22019 0x99a8c11f793797f0968483a42e68945fbcd5d857 0x0caa969272b7df12894a83922a25dfe7a66d3ff5 0x179c9c1baf832fefde57db7d59d706a06751d15d 0x44b7d9244f179c4349f30dadcd6ac35952823971 0x70a8e87d161ce6d3533b3c9b9fd7fae6957b4e4b 0x765fd44be94c3e9c4e369c1e2aa1799e9c1500b2 0xa1eb44d1a3f833c82122ecc37bc51a13ea2c400f 0x1bc6da0f269419b7ffba1f0547ea030851fecba3 0xc330743dfc05f10cfb30f68a562bf74a0e38db48 0xfbf19847cd3d989f84b3253dc918804662083113 0xe3b81b1121429e96afc95ddafcf73e97cb6fdc07 0xbeaf0592a1f0380b92d65b93152835645c658a9e 0x2821ccc2beb73aff1b21e85f3adaa2ffc24629c2 0x0fe29b700c1e07e141052698c179f1d954bedd51 0x56de0c1b58f16bd7edfc1b532ac5dc4e07972a22 0x2541cdf04d4a4ae1f6757f2e2df9bcefd4e29f39
