ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-77D6BDE9E5AA
|
Infrastructure Scan
ADDRESS: 0x255d868a8843948b53514a4b5e97c4c99a16da4a
DEPLOYED: 2026-05-15 21:57:59
LAST_TX: 2026-05-15 22:13:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Pulling contract state from Alchemy RPC… [FETCH] Bytecode size: 2868 bytes. [SCAN] Analyzing visibility: 4 public, 8 private methods. [MEM] Snapshotting EVM state before execution… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Simulation completed. No state corruption detected. [TRACE] Execution path: 42% coverage. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘9c81e725…72c741e9’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3747f61a8bd5cadb0796460d3808139855a7feb0 0xc764d644b13ab8b67641e558ad6ab8b890636c99 0xd2f33cbb39303c9c5f424edf9989edbb1b5bf8c1 0x7732a4e6ba1b8c8eb3174a0fd50ce0b1fbd2a326 0x470c15e89d341ed9a3cfd3a5f71faa152c8ef3a6 0x760b65b94c6f0100540b9d4000d0573384843365 0xfa67574167ab563623318517f5020bd18a9f8721 0x6e726488ab8c688aa6246987ddaf938641df3875 0x1ddfc837433c90c6d272dfd1878756d697717c62 0xf0b4f213554fe8bd3caad61f16c4c5d3776a7f5f 0xd0ff003cb1b0f3071ab23c76afbae14008bf158b 0x50577c5c97c085e4529d8ccc109c0b6b30f40362 0x5c4f28a8581f4c241e6710776788a2bbf88a9f4a 0x1eeb591b9012017a5dca1593dde5f61850f76d47 0xf8967d23673befd5750f33bbc6bfefda415f971c 0x75d4ef7cd83fc9b684d97a1040e8794aec701a4b 0xc3439980582f4f2acf8be59f1dcdea5ab6e4afdd 0x4b3930108895faca93eb1f7408f1a84e82d37bc9 0x328821def80f1e4c1e64ff002636c49e66153d04 0xb9f3c1db897f24385eee4fed03c5cd732e9dd087