ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2CC8BB046DA6
|
Infrastructure Scan
ADDRESS: 0x3073f06951f95520af49d790dac17e1f4f6cca1b
DEPLOYED: 2026-05-10 11:34:35
LAST_TX: 2026-05-10 13:17:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0x3073f06951f95520af49d790dac17e1f4f6cca1b… [FETCH] Received 90 segments of contract data. [SCAN] Analyzing visibility: 6 public, 8 private methods. [MEM] Allocating stack frame for EVM simulation… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 79 iterations. [TRACE] Execution path: 83% coverage. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘C82BA25F’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd7299f97fccc70e0fab0d10a69af4f4f89e73a37 0x47c657caf55ee8587fc454450d5e2fe38a372501 0x34c32840fee7c35df280bc9fd347265fb9700b7b 0xd4d439c180aee26c289dc39196d1caadbea5db02 0x98c807bfbcbce68a0bc5f7510a5deb9e2ad8a03d 0x539943bd490fa326f6ce59f409dfa4ecd54689b3 0xd5073dfad30ad28ac8a3aabf5957dff905d4fe43 0x19507a1a1a787f86f6d30ef49dd865febc1bb368 0x756887133567f14b6ac7902985c75c722200a98d 0x08aa03b1138c364dc5ceb1207b811b19c9aabe74 0xb6ff5237dc43af19dec03423e91ec3944067759f 0xe85057124da8f1217a6aac938bba90c4c33bb37d 0xd0ed2d8c3d7ddf2afd0efb68211431d151ceda4d 0x93b2cf832a1685833f428002adaf5af1a6541459 0x9cfe11a1f174a18fc172c72bc2b9257ebb876d0f 0x62f2ab521e9e8494c18afd716e2fe8577575537d 0xf251ebf79ab2e25ef53f77d210ebee4c4d2cd31b 0x4615d71f2664d798883039b6f58c89d6bc60470a 0xd32e0faeaa5a1b02a69ea331fb209c3ff1a2c326 0xc382d729f6434ba97de5d6a0ee3e22ff6dd6a448
