ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-DFBB9EA1FF28
|
Infrastructure Scan
ADDRESS: 0x26fa7d332770f9142252481078835d56334bc278
DEPLOYED: 2026-05-07 10:46:59
LAST_TX: 2026-05-07 22:00:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-1. [NET] Latency: 42ms. Protocol: JSON-RPC 2.0. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 2 / 1024. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Verifying ‘require’ statements integrity. [TRACE] Bytecode segment 0x7e analysed. [VALID] Finalizing audit report for 0x26fa7d332770f9142252481078835d56334bc278. $line = str_replace(’04a1fc3ad34ce1dd71ac72a2431c7fd46b5be1b1b736a869405cd1e44b5bf040′, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0af2f576931aabaabfb7e92596844adde6352e6c 0x90f43ae3e7387f6772f499ed5a751cd3b450ab05 0x597a01608952220f1d833c833111731e6762085c 0x365aa1290eaab6945c9f1f837ecf256b977a3173 0xfe14e17deac02f5e0072ef48d6fe548aac55c03c 0x091b2eb36b398b9132a75d7e1997e7b559255e3b 0x5425159c6f3b83001f81fb6e37b1ca5a2ff9a27b 0x17c9d1865493fb0d12cdac3aba80fa391d4be6a2 0xcc5d944aa9b7c9937e49a3f001545b7e215f2772 0xa41d1f150b920afc9d36c4e069f1cf71aec193f7 0x22b53cae88998c95d8671d9d151a5eb667bf9ba4 0x1436a2dcd7c08a3b5f1b24044a32c2eeb12bdc91 0x093c99c3b59897b989b229e2e9c6b2e0a6e9810f 0x858800dee804a46a6d748bff3795494afa5c5513 0xf823cd53924ccdcdab506e7b7d62c08561d7183e 0x1312562625b52e023b6ff2b0d233666a6b31038f 0x838422baf6d5975960ebc4a4f32ed98a68fedf7c 0x28b40fc9dde267a91ed739961042ca34d5a1db2a 0x2205df613847b1dab2ba52e6f753c1178349072d 0x5668d79cd1379ad293fecdb3155bc739aba2d3df