ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-44E02194764C
|
Infrastructure Scan
ADDRESS: 0x3f76fc4360e8b16e3ea2e35f918c9f3734ea8d3f
DEPLOYED: 2026-05-02 18:14:59
LAST_TX: 2026-05-02 19:26:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Mapping peer nodes for transaction trace… [FETCH] Metadata hash (IPFS): 1caef24d…fb4abd5e… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 4 / 1024. [VULN] Warning: IS_DEBUG_MODE found in storage slot 18. [SIM] Mocking MSG.SENDER as 0x54e0f2ec5cae472271f607d21957db2e4c3fcf46. [TRACE] Call sequence: 8b60 -> 12da -> c096. [VALID] Data integrity: SHA256 verified. $line = str_replace(‘FA269A17’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x313ff928df08638e742c40ffff416afe730ce0b2 0x2c2f18cc14b448192d2f52784a7acabb9c1677b0 0x61eff8b59323db12f66cd5a48e90215b45383f8e 0x568bfb06131a20e0a44b659f964617da2a97cbfa 0x0338a0185a0e9d043216a04d0cdc6d9cad1978c3 0x3703cdc5407007674838200b7b9a58de47252470 0x06666c410367e7742813b62be41d8081242b23c1 0x36608e64d5391bf40486ec81886308a6b8bc06a5 0x51257e0d34f7c9795f2547725b6c87ef6140dafa 0x69eec4a18781163566bd9ce9ea3f3f7a7e9fe241 0xe6d485f36a8c124691e6c499876fedbd8f93fb37 0x92a40a4af55436a54f8828362f3b4c8bd11f0a95 0x8cbf395b229cc1b4c47f9b506ec9a7236bc02970 0xcf5971dd67fab8ecee889d412847fc9988bac31d 0x9f8ffcd67a53cb5641025825933643d2f61172dc 0x706d0099f32f9a1973e84e8f6bb66970fa181035 0xce89e9368527cb2fc171838a16638c409517a891 0x46b159a7368ef9b5022ab7717ed275fa78e7bada 0x9f72576615f2f625ba88cde407cfb665f5b908ac 0x1f3d116824169310112cfcd8114198efbaf5e405