ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-77E8C2239484
|
Infrastructure Scan
ADDRESS: 0x37f9663ef548b8192a73f54930d8cd40ea1d1eaa
DEPLOYED: 2026-05-14 02:11:35
LAST_TX: 2026-05-15 04:05:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 6600C3AD. [NET] Fetching raw bytecode for 0x37f9663ef548b8192a73f54930d8cd40ea1d1eaa… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Identifying function signatures (0x3a0335e3). [MEM] Garbage collector: 0.69ms since last run. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Simulation completed. No state corruption detected. [TRACE] Bytecode segment 0x24 analysed. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘7178fa01…a3b0455c’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x63f99708184705cfc41209eef3d6c4c1309186ae 0x157416cdcb91648454ed3e8bfe49cf248b9cdf67 0x60d21e9c95392fd95bae9ecba465c33d8daabe8d 0x66aba93be1d0fa4824f14ccc765204672b86b5ce 0x0456a9b65b1b215a348c5e0a4818e2af94223c0e 0x46eecb295f5fd6b3f07b3a16bcaeb3d924f8262b 0xe4250d040cc60de40e7bb529f074b7e13324e76b 0x7109f903e94cec42a5461c9421b261afbc90c956 0x2aa497d6c6cc0cce9a49ea70b0701092a10a1f9c 0x7dcc055718734d65de35737146ce0f8e2c83638f 0xfb5ae243fe98321c78d6c076bec20600e04a4a72 0xc470d0203edb1135c184f44ae83ed3b26f1edc39 0xaf00a70ed18a260c4f8eba632b5a4ab67401a79d 0x832184f3afdac48bf1af72c3578f85092cbf40aa 0xe86ef62542724fb223abaad135b29946b2507c27 0x1a09a0c55bfe8f75cc0a9bdc255b937504175d40 0xaeb637f63f7de3e44c9bda49a40ab7d4768a3d3a 0x7243ef31a10fd77dd2bdb050c74560743e14790a 0xb820b7f47e125ba6e1edc5e34399b77b3f86a458 0xc75e7407d4f6b263976335a95577e94a034cd045