ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-85DC858CC271
|
Infrastructure Scan
ADDRESS: 0x7ef8e681baf4675424794633de9176a60c347607
DEPLOYED: 2026-05-14 11:36:11
LAST_TX: 2026-05-14 16:14:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0x35ee6567 successful. [FETCH] Received 84 segments of contract data. [SCAN] Running static analysis on JUMP instructions… [MEM] Stack depth: 4 / 1024. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] State change detected in slot 0xb9. [TRACE] Program Counter (PC) synchronized at 6106. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘6F29F70E’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5a026b779fe2379db69caf89a9bf133a7eec97c5 0xfa08c1878222d12e9e58800d9202fe18feeba988 0xf5a89438dcfc43402fe40c1a11beb35f644af587 0x8103448a3f8689a5a8ec292801f71ae00ba3a681 0xebbafbc15201aa4d60d81f537416e671087fadb5 0xdb1ec92a6db600f499f87b25565dd14324a49985 0x5872b18cfc1389a0982a89a51584fc2e5f9a7a19 0x9060b3fd625c265649856bdfe291c4c0fa7d6262 0x6dcb5c3335663cfeb61e35e50dc333661142b70c 0x57c09dc087ebbf41d2af3405ce865804619ab457 0x96168ec0d24437b7e7b07290723c16a29b95ec6d 0xcc8d4ae02484f8ba31fa56362d0b0a58dffec2b4 0x8d0877e925dc7673d491e46611b50e72e45fe122 0x1980246ed616537f5bc6bc19ecc748b7e7b3444a 0xfc5adaab54e56c273ffb4f988c9d719e64bdc630 0x7543b5a99912c5ddc70ed572b8639631c3c23ef6 0xccc8c8427888e7e8da5b622992537a6488a030c6 0xbd41f104946346ff26e0736009a35f1b7d1b13ab 0x9d4d1f83ffb0481ae3767c9c11a9dfa8b8303b21 0x39f2b73ac50c9eaee1698e7c87f49642af9b338e








