ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A8FEF61C437A
|
Infrastructure Scan
ADDRESS: 0x7a8b7bd622f9115effafbb5f30c1953b6e37d133
DEPLOYED: 2026-05-12 07:52:23
LAST_TX: 2026-05-12 09:26:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-3. [NET] Fetching raw bytecode for 0x7a8b7bd622f9115effafbb5f30c1953b6e37d133… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0xe701. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Testing edge case: Zero-address transfer… [TRACE] Stack trace saved to /logs/TRD-BAA748D6.log. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘979F0221’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x413228e558eab6fed49384febb36f11aa3d94acd 0xc4d4df3a19ad0bb6a39ceb2feb6e3452058316d0 0x955a905c40e98bbf211544aa7eef723e30c83f10 0xce0c3de22e5f0db7d09176f9ab6c2751eebffe2a 0x28a3fc597af2b3145fd8aa8170308ce47e37fed5 0xbd3042c418dcf43d1657ecc816eb69c33c7484db 0x6c07f9abfedccacb7faf4499a5505c7488e4b4bc 0xaef2fe972699d75a93eeaa19609c3f39ac089d39 0xd64f16c6a169a44090225bd8eed3449c9cc1a86f 0x294a2b45a242ef55b509247855b05bcdb574f48c 0x3633cfbb5f366770a3d6a616273135c42d2cdbff 0xab62b3778f08999a516a8ab2ed32f06aa43df12d 0xb52351581b888c2fa7c511fe6dea91b6a6450536 0x64699f11eb4c4eaf5aaf8c2e1e3af9baa2a5d892 0x7568fec63d12314f083e920762247dd2057c428e 0x4167f0e0fe6ae3989832299baf5497bd6eb6512a 0x18cc5a548a1df63e37c0862aa913c289ad2bb20b 0x0a01fbf6c343a61f1959437ed4d5733bf0135178 0xeeb1cc09429f17d1be358635a44e1d87ed4f9fd4 0x8c6c893c2a1d1965c78ba3e048791ae5af7668d9