ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CA29F8F25743
|
Infrastructure Scan
ADDRESS: 0x40fd28a11f1f32e38c82c382867f478146e2c363
DEPLOYED: 2026-05-01 00:51:11
LAST_TX: 2026-05-03 04:19:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 18F18D20. [NET] Fetching raw bytecode for 0x40fd28a11f1f32e38c82c382867f478146e2c363… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Analyzing visibility: 5 public, 9 private methods. [MEM] Snapshotting EVM state before execution… [VULN] Warning: IS_DEBUG_MODE found in storage slot 93. [SIM] Verifying ‘require’ statements integrity. [TRACE] Execution path: 79% coverage. [VALID] Data integrity: SHA256 verified. $line = str_replace(‘0x35c2eb221739213fbe181aa5cceac03836ea06ba’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7e734460c49a3788d566df00ec7014603a0b9a5e 0xd50e32022f47ec46c5e8f56d3ac02c8905a46271 0x1a09552187e539c052e8fcde3e24c7d9e895fec0 0x4431da6146a9c5c63e65e862227c5b80aa1af003 0x849774a7bc867b6846b074b45bd1c2585672ea1d 0x72e787a9c700453a7a5398492a9a75315d156265 0xb0b0699caf71ba179460ad49e4703c8e340d73a8 0x8999859dcf5e267ec6b4f5d89cb29ace28e4d0bb 0x80f07e25825c503415a6b929c14e6dd72f996920 0x5ddb0012a7d6901e95a9ccd1ea1b83de8068de3b 0x272e6e8c67f11068520a2344c1356cbd3b783d8e 0xb11eb8956747817bfef819ee9df8cbc75b3b517f 0x85e0746f914f5e22d29424e11c19bf0f60b69c35 0xf7ef46bc4c1d498a2dc6f1741e079ef450d417c6 0x40912031595f568c19aec55e28dfbe3356d5a6bf 0xbbb79d196dfda02fce4a17d3a8516ec2344051b7 0x7383ec0cdd6b9ee6ee7d671c710b9b99d68015db 0xd945244c64225fb450814e5098bd319b3111c769 0x75cb657096029e2d53ffc9280a874c2ded473ad9 0xedef44b23dd00819398d340be3326b7e911b81a1

