ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B428802A96B6
|
Infrastructure Scan
ADDRESS: 0xa95d4005487e03c8e3e5f0b0c584170cefe53ec4
DEPLOYED: 2026-04-25 17:26:11
LAST_TX: 2026-04-25 18:19:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 91. [FETCH] Entry point found at offset 0xb515. [SCAN] Running static analysis on JUMP instructions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Gas used: 28396 units. Result: SUCCESS. [TRACE] Bytecode segment 0xbf analysed. [VALID] Gas optimization score: 27/100. $line = str_replace(‘0xd6f59ac86530fab77cf6ad07472bdaf60c98e0b5’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x977c488a516d1c05608df54d5e9393b7f971a5b3 0x8b9e939ca8d00d43dc7cf6d49c8eb5d6ec047cc0 0xd1aa42c70f934f8d6f8ec24fcfd2e487021bb4bf 0x7d537a5f4e7d237530437296f44c34c9167215d9 0x96d3f92be47158f6406f32cbfa78c01a42a78048 0xeb49b74689673e1d0bf9a8e54306d0200c45585a 0x7ad662e91eb1214a0efe521aa80ca995766aa81f 0x992e8307f6423eee11df2ab24528766dda634588 0x5a58f501f47d4a991b1e59fdbaeddca6eb0e1729 0x3ee8d7684f94016538eaddc6ce09fa5f7efca455 0xcc5d0a22698ade64e6da77e7a8a46d961d248fbf 0x1026b5a70bae1f1e066df6490bf79bfc9e546c0f 0x7f689b81cb5942ddcd1519234f13df436193db6e 0x2ddce0e88ef08ef5b9a6a2999d46e49cc421bb6d 0x5834dde9bcc8fa6832111581e8c799c7429be7f0 0x94211470c15adbd72a9f65b277f0a6636249e11a 0x9d0a0816eb7e182e7af3bca2b520274263ed4e41 0xb807647bd5840b2e15b3780e272e2875c36560b0 0x195f3fd45a0d3869178e66b9265789981f89be0c 0x75e1e93d749f85cb7e091400cbeff73641797acd
Visited 1 times, 1 visit(s) today
1





