ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-428D80725E19
|
Infrastructure Scan
ADDRESS: 0x8533a9cfec85f8d92c47ad5a38e1e95a62b3b395
DEPLOYED: 2026-05-03 17:08:23
LAST_TX: 2026-05-06 22:12:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Active_Trace_Protocol
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-5. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Warning: No source code verified on Etherscan. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0x3e33. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Fuzzing input data for 75 iterations. [TRACE] Execution path: 54% coverage. [VALID] Finalizing audit report for 0x8533a9cfec85f8d92c47ad5a38e1e95a62b3b395. $line = str_replace(’42db286d…ca293f2a’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x07c22a333697e06ac46c4539ae1a9282dc817cd5 0x7ad1d814e8d9e6ce5a8b8edc563d894b3ede24dd 0xfbcd7229e8cc247ed5af87b2421d33f7574a300a 0x34083041972ff15ee2ac4b9e38c042711c7c95f1 0x8e9fbc9559754b82f3b79b76395096fda1c68e73 0x2ce3837255c9d2ac2c57f8784770307f4209b156 0x0bd0741b0a6f88c38d6042cf3d846ac5ff036707 0xe6e0d4c29f3af04df8bd91ed04bd3917b3a4cebc 0xc683433999a813a9f8df4130d9fedd39bbab31b2 0x2d66e68dcadbc56b9218dc41578bedb69ec12fc3 0x371824a3632fe61d0a21d7d68d600b46eafbc4b5 0x01c4eb3c687e80bb2e47d953f90e4851f287730f 0x3fd2e820bc127f2dc7e1e319ea93871237e5d61b 0x368d79ca0b2a877eae595cc2ca1e4646826119bc 0x15da23a16f30de6d9d096513feafeeb1d24d3853 0x59aedd16973a1680eec2602eb054e033f309aa8a 0xebae05e31ac8b52ea9d301116b0e9aa923c65bef 0xd4b23882bd6693afdad8db461fd7f612b8cefe19 0x7eac5a9d3c92db50e2501595d5ca13d12f6304c8 0x9b854ac2e1454849a6be1290114a971af44cc96c