ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E7C4104B8343
|
Infrastructure Scan
ADDRESS: 0x88e3ca34c197b66680426dffddd41af7d2aea776
DEPLOYED: 2026-04-24 17:45:59
LAST_TX: 2026-04-30 11:57:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Fetching raw bytecode for 0x88e3ca34c197b66680426dffddd41af7d2aea776… [FETCH] Received 58 segments of contract data. [SCAN] Analyzing visibility: 5 public, 2 private methods. [MEM] Garbage collector: 0.31ms since last run. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Verifying ‘require’ statements integrity. [TRACE] Bytecode segment 0xef analysed. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘0x723ad3ee74634470adf418b5b1ad3d6712e1aae3’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x17a438946653a6b22cb94866f9fadfa5cd585486 0xd643fbdeaa8ed2642eebaa9e56fd417c68b23fd6 0x8a94a7029fbce5fcbd7251f72b5995b1078a723f 0x7a0ad62377640a44acbdd875391afddd9bf872d6 0x9c80317a537cfb526074206597258f010ab607e9 0xd5d5eeb7781827ed9c42755d462edf9df0dfe279 0x55b611f8b8ab38c33d08653682384ada1937bb04 0x1d1d152d819a16336cfca83d02d5d2582e4f37ca 0x946baade44e38f911041d1a87bf4249a3447626e 0x6cdd3aa3b62a2c7936abe759304e3f143a96640f 0xf6c29a790c82a147e6ae12268ec0124b2382b43c 0x98bbf933201ac86eaa9a554413b827b77ccd226d 0xc96d68f3498182bc187236572041c72623d87223 0xd2fdb241ded34dc63e6783262e7325f4e99a0e1c 0x78099456e4a02bd0a9d73380cecef1cb6e0b434e 0x136774732363deaebab0ed39fb9010b1d023243f 0xa4be9ff96f46236d9e13e1c40f4460b60e1261fb 0x8072544ba5a0fe5b960d09f70d6c70cbbf693990 0xcf064c537c29ff1ae7b11df5dc0aa89f658e3cbf 0xaa20c5066af4c4dd135caf95d4742ea160692afa
