ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1C514C4ECCB7
|
Infrastructure Scan
ADDRESS: 0x0c53ac1bd8e42c27863c6e6860cfd185feb89747
DEPLOYED: 2026-04-24 18:23:11
LAST_TX: 2026-04-27 04:12:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 36. [FETCH] Metadata hash (IPFS): bf6bfb62…a266eb64… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Stack depth: 3 / 1024. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Mocking MSG.SENDER as 0x7b85d299affbea37f37170f6390d2cdd7857de08. [TRACE] Call sequence: 2b05 -> 9478 -> 995d. [VALID] Finalizing audit report for 0x0c53ac1bd8e42c27863c6e6860cfd185feb89747. $line = str_replace(‘1C520CDB’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x28e717ff6c5bc06623184c0dc9f064841a8d5a18 0x0dce4caccf15973221618e4c017cd45d0d4c412b 0x03b17638e33761fdec1c961ed308d3c93aee9027 0xe540992c413e1d2f43d220d22fac586d8348d0c1 0xeeee0be958d822086d4fb8961570d57e5dd0fd15 0xf4d6d075c7e8bbb0a396f7064cf76372d4c8c767 0x72d9edbc6ef3574a3ddd3c9965688fc659c74a95 0xfb0fb1a77f3473ab5733f0109691fed70d40ff2e 0xe92b990f791d97ab331d6bde3d62358c17ef17e0 0x3b34a69b0f52a2dc70bf0b8c7f6ddaf39b87314c 0xc98fe1abd584de7d7a4a78a1591ca435ab8654a9 0x0623ce0c158acb864518ad4748657e69995a6cd1 0xe218b36eeb9da4676d4e332e7470892e24165fe2 0x44691c1e507190c2ea5c2554300719aee1520257 0xdb18aa4ea4ec3d2bd77d3d037c2e810a1ff3fd12 0xf8ec815b09e3c544046f79a34afff2dfbe285dc0 0x672bb0a1ac120cb61ecdc6d2c3aa1e042f0eb941 0x026112aa5290df6493c6355486d1e64ac2ba1ae5 0x276b0bebd37facccb37d90bd67ad63eb897c624b 0x885d09889918ed667735d147cdfdf8b39744d906