ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A14CD231DF25
|
Infrastructure Scan
ADDRESS: 0x612e32a2756e1b3bd7ba5aa68b8774a934717c66
DEPLOYED: 2026-04-28 09:59:35
LAST_TX: 2026-05-02 20:12:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Stack depth: 4 / 1024. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Testing edge case: Zero-address transfer… [TRACE] Execution path: 18% coverage. [VALID] Gas optimization score: 54/100. $line = str_replace(’57D7621A’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x07db3787fe0d1fa3cacdae60c6cd7f1fca4c3206 0xa36482e0cd09a8e085b522ce4359a0557b11c71a 0x453e2ec90b1a8c7b58300c541f95c0bc389d1039 0x278204506abb4836bb6cb4f24994f99243ac736c 0x5f6026e4f6292ee0419fcbd067e3e18c1670dfa4 0x685bd69a04f1a10bb5b4401fe7d26251f265b91a 0x40bf67115a4e911e70846c91828334dfc2a6501e 0x859b97cdd9346568e764ebd268d7802eccf3c59d 0x10de0ebd44b69e4861ab01002467c8c9d7e71b94 0x3111b0c48624bf74ab799a1f560312cfb3675aa3 0x26186d82d915edfd0046595cfed90d5f5d1b7f1f 0x7571da0785457e88a7419ab02bd65c64d860b596 0x0e6fe36915b4d6b0f00ee707cde1586785cfea8e 0xe5854139e7cd950c54179e206f8945b980a53196 0xdf289f1e32f2d8924af464e6e2939ddb85f5f10d 0x88c9c569047f3dfae4aaf8e99a51243cb304c18c 0x56b2c71429f1462ca3965d5b86baf716de07fb41 0x10f668ca075266fd4cfa73b3c8b4081b3937c71a 0x311e70a55b6dc7d41355c4c66ea099116c01633c 0x7d6ee29bdb22469e20a31a40c3cbb529317d13f7