ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-45FCC6E9A341
|
Infrastructure Scan
ADDRESS: 0xd85a54b21559a9f4828638b05dfa5a949b93d01e
DEPLOYED: 2026-04-29 19:55:11
LAST_TX: 2026-04-29 21:20:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Fetching raw bytecode for 0xd85a54b21559a9f4828638b05dfa5a949b93d01e… [FETCH] Warning: No source code verified on Etherscan. [SCAN] Mapping internal logic flow and branching. [MEM] Stack depth: 4 / 1024. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Mocking MSG.SENDER as 0xde519cd76f1717bdd5322f0821e775fd0b054072. [TRACE] Call sequence: 1692 -> 1d8a -> 30f6. [VALID] No critical memory leaks during simulation. $line = str_replace(‘84643EC3’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf8589ae0df50709b35d527c746a763deb23af8b0 0xf30f521ead5a61980115da9278b0f323766fe562 0xc348a38ee4a9705f6622c18492a08aa6c0189e68 0x7391bae0ee2606ff26d29583e5312ce8fd5289d5 0xdc049324a1b9baf692890817a80c0bc2c4e7f841 0xec24c6beee26cf76ffa9a1d156e13921be8559f2 0x4376e2258d455173546e91e2064686aabfc097ea 0x40712a04be0fa8ed362fa827abd4ac9a0a3a090f 0x2664db39f69278004588e49a2a85a45290a24c3e 0xc37686843a96349f6ac873f2d097954d2020dab6 0xe6741f7947ea2581413f84db617bf0e3dcdadc49 0xab2799462879493f4193d1a4efff3600882a2c28 0xcc83b8d4f696caed69801cc5a3759b859d8ba5df 0xa3bb5c09895634d7060568630dbfdaa5c1d905b2 0xc311d08850043838029c977ab05873b6702d2fdb 0xaae165b1053acec961385bab94886f13214974f4 0xfe3daadc1d827fbbc6c2679139efa8f7a7ecf45a 0x37863ae8b0fb600e3f30f1a41aeec964fb45fe59 0x890db94d920bbf44862005329d7236cc7067efab 0x2adffc3d6e5e0a7fe87aa63af9ae033899ebf052