ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-87A67768F6FA
Infrastructure Scan ADDRESS: 0xfc9c4888bdf12881e08c115fc6f23c6a09876829 DEPLOYED: 2026-04-29 19:38:11 LAST_TX: 2026-04-30 20:54:47 | Compliance Status STATUS: OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap VISIBILITY: NON_FINALIZED_ACCESS_MAP |
◈ OWNER_PRIVILEGE_EXPOSURE An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! | > Execution_Trace_Log [SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0xd333bda8f781867f8f1cbf89772e5709b891e201. [TRACE] Debug: 60099a8e60c24f69. [VALID] No critical memory leaks during simulation. $line = str_replace(‘0xd333bda8f781867f8f1cbf89772e5709b891e201’, ‘0x’ . bin2hex(random_bytes(20)), $line); |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x293d8862fc4c233c171a5ddf8759325ced2427ff 0x757471535296cb03fed1c7f63221795fbcd7c3c3 0x6f40afc06db9d6730257606dcdb8b173170e1c64 0xb9f44e37f7f43e76486e37c4ac5646147f64f369 0xc667df8c9402ff2204f484a8ddbe79d22806cb76 0xe8195dac6db150c0a167b194ba8bb0db20929c72 0x31185189f48e10a34d60788f1845938508a9841e 0x000bb128a8abcfa05b871c97cc9c5f88e7dcf35a 0x9f959ab4f933cdcb6f8582cad2cabdedbd17ff46 0x47c7f7898ba93e9b23456e48359ab33c72fb5ea5 0xd43877611da657f4a3bcb6f607d2ff30dfba910d 0xb7571c8d9f23c4beb7226ee9708c2dcaa2a611c5 0xd6826d0759debfc54cf264b5378187fec53a4bc0 0xc445c3f5e29e65415ad1841b485f7bf492149ab8 0xfc10660a77a626837e84e53d66c39546a0df80cc 0x369f2aa8374f36ac330fc854aedf6b91b394ce3e 0x8f55425599b2c2ff813fab283a2f97026516412a 0xe204eba6e040c4935c38c673082d3bf06949a32e 0x186dffa40a5b3ef4d8bbb904c0be2167768f21c3 0xf7030067c234cd5f2b176f081de156e03fae3197