ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-ADE854B11D63
|
Infrastructure Scan
ADDRESS: 0x969ba461b2799478298047f70e831267d27499a8
DEPLOYED: 2026-05-14 05:55:59
LAST_TX: 2026-05-14 15:04:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: CCE2877B. [NET] Fetching raw bytecode for 0x969ba461b2799478298047f70e831267d27499a8… [FETCH] Reconstructing ABI from function selectors… [SCAN] Mapping internal logic flow and branching. [MEM] Garbage collector: 0.32ms since last run. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] State change detected in slot 0x46. [TRACE] Program Counter (PC) synchronized at 6840. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘0x670c8f8e94f78152f34a559f1ae0ed56eaaa073f’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe1a92e60f7060102674fdf3d6778085b12174686 0xfee6af636a53a2ade3119e4427bd90c043ad2e96 0x39bdb69ddbe07548f19679fb2c23abedc653527b 0xd28e335dfec4a5e121f6c268450fd9756f505786 0x8e3319c2c3d5727966ef5b416dbf866384c083d8 0x9c520ac86ab48e0e36005912b6b0b11a8f163e3a 0xe01765d614e7a76ba78fa0a4832efff2d149ffbf 0x040a7bd71a4cd4d1ab328452f850bebf4a702327 0x3a8a3c2eca7c1a7fbb8a12c7f2444f5c05ed4bd5 0x24fa298b968cb7efe57a7e1721d6298d7894fd4c 0x7690d4828aeba7986026e6b4bb2520c72d4f73d0 0x5c0179532dd7d5d19d5ffebc053bb2d26a065fa9 0x19ccbad6a7d071e32bf8edb6e77bc3a29f4d93d9 0xa8eb34ad46bb70addf5ed4cccf05e25f160dc267 0x63132bd00f73a42e83f1394c2b27e49097865dc2 0x08ba150b3d226d4382756b468846e53c8314d8ad 0x318567bc722270f4e010d31639f43ea9e80d1089 0xf0261129422417e93279813f2741ac5a5825a06f 0x838d761d641e23b468dd0078079c08b92689621f 0xcb7ff84129c5f70edf36a749ad9e63af95bb0087