ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-97C29038EE57
|
Infrastructure Scan
ADDRESS: 0xe59f1bf5fe1b84a510245bdbfb698ac5d1ad18e1
DEPLOYED: 2026-05-12 20:25:35
LAST_TX: 2026-05-13 13:30:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Bytecode size: 8089 bytes. [SCAN] Detecting compiler version: v0.8.56. [MEM] Stack depth: 9 / 1024. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Balance check: 7.34 ETH. [TRACE] Debug: 796316b91794f6bf. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘b76f0885…8f440d81’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x17d3cf917deb559bc806862a94e48a82702a080b 0x10aca37930eef284d529d2a4d5a31117a84d27e1 0xcffc4edbec18503d6b5570cbaba868da0e8a552d 0x19b3db487c6690f61f25c3552208241160ec5651 0xc98620ff78082ec80395ae9f72a55070e92f2a89 0xe10a6061cb29cd587283ac3c05aafaeba6c5de9c 0x777777651a6097a97de9a57571945ae8d445a341 0x9cfbf57353a20d4c3235f9b8c3f7c956a6e8af66 0xe3f62efa0a9e19b306acfc3872b1b070f894ed48 0xc99169dce794261bb0ae2c99c5674e71a9534785 0x4b388924e226bdc157e6612b16725134551ee79a 0x9033d73e2def13a608375d24136670f51f25af6e 0xfdd6390abb8e6909a94ca523b29b31e23acde0c8 0x5e31622404093a90ec6a499998bd44d7b51640af 0xeb260622e54aa9cbc3476c1abd4b27bbc5eece09 0x3a7f30f49f02a50c49c7daeaa340a49a6eef9275 0x395aef003cfcdcb08316d677aa0441313c50da0c 0xf623f1771198a898879d0d0dd0b159c60e06de40 0xacc1b391a9314ccdd72d6b85b8a5792d941d48cd 0xb740dfb3f3c93bc33e8aaf76b205e91ccdeab767
