ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CAA87ECF049D
|
Infrastructure Scan
ADDRESS: 0xfa75a5038381698d507518f01c121bc78af9e95b
DEPLOYED: 2026-05-08 16:51:47
LAST_TX: 2026-05-09 08:06:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Fetching raw bytecode for 0xfa75a5038381698d507518f01c121bc78af9e95b… [FETCH] Metadata hash (IPFS): d2538ee5…e906d7d7… [SCAN] Detecting compiler version: v0.8.72. [MEM] Tracking pointer 0xe8b82ab8 in memory heap. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 84 iterations. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(’12DBA93E’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa676f08ef323183b20da80aa094ef34b5c0eb6a2 0xe925754c0461e9ec3f0ecd333fbb151aca5d017a 0x42350e592b8ed9f3d388aeeaf16999be9a818942 0x90ffa6bd698654fdee8a92171bc3b0926f281897 0x611d1516875507dea66a4885732c9bf58317adce 0x5fbb8b9bf236fdc80cb66286ff379d00a9224f73 0xed8a55b9f0ea58b57c2816989fc3935fe8240763 0x9977d9693eecd904892fd787b7bc72afcfd8e2d5 0xbcebcab06e28ac86116cf08f10858e7c8ea748d9 0xa07c7346aeab510ca853482db4ad26aa33b99aa3 0xba52776cd405d3fb2defa31d75ff2922816d781c 0xabe38869041923bfa647640dc52d3f0a11504816 0xf837f27d72ec43e14054772b3da5120d9acb1bc4 0xd8265f9a4523db451c68c98d6d792cf2816477ac 0x98af1090403aba289106f7bec5c8e423a84ca2d4 0x01c4eb3c687e80bb2e47d953f90e4851f287730f 0x0ab546fe9a817efd592e96be964b2643e8920135 0xe771f0cc6f82cab34bcdd99e08ec002045bab648 0xc06a4f29d505d8f53227d47af9b98656aa2cac64 0x9cb842080b76c2c5614d0a7a1a577826149d6498