ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FF42CCF94F87
|
Infrastructure Scan
ADDRESS: 0x7d89cde2e38f514ae72ec89f7f336c696d35a512
DEPLOYED: 2026-04-30 12:41:35
LAST_TX: 2026-04-30 14:10:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Fetching raw bytecode for 0x7d89cde2e38f514ae72ec89f7f336c696d35a512… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping internal logic flow and branching. [MEM] Garbage collector: 0.93ms since last run. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Fuzzing input data for 64 iterations. [TRACE] Call sequence: 628d -> a7a1 -> 33d7. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘f64625c7…0497906f’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb2e6a0c33abea58ed4620df287e209e99ab770ff 0x232e7023d12207fe21d4a258e9e5cd3d92933a0a 0x610539129d0e646580520da6a37405f675a2979e 0xc6fb84ec84fc1021f5bcebe50bd0ad2c51ac814c 0xd7de1a7f07d5cf5766d8f9c67b036f6ab554c522 0xd7b3d792eab27c8c7b3a401f80bca1a5aa282461 0x58cad2ed286b3c2c3c6e81dd77938b319bf65d64 0x9e64001c770ef80d49f1fb3f6b9776c21c10b8ba 0x64ebd1053482b9541bc15e3f0e83e575bdfd840b 0x9d35142810bae3c529cc45b31969a5ed6bfc4f5d 0xbb2f4379053191d2f79e740b4b3da3531b254e93 0x809d192432771799a37bc1b49e2d35ebeeed91b2 0x368d79ca0b2a877eae595cc2ca1e4646826119bc 0xbd2b5ce14b6785a52cd2490080ea8fdba26bb8f2 0xdf906bd0acc8053041bc947b2cc1834feb33e87d 0xe8a9b426f193e361fa3122bf7a87f9f2c913b993 0xf5e0f3c59cfaabb18d2ea560e2d0b5a3543e3754 0xa4b080b9b35c499a57ea894189ca37977fc3ade6 0x4fae9fd1670c7b1ee78c7f9bf9ad47069772c6cc 0x5f792dd6e61d848c10bf82646c72ff19319b09f1