ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-EF5E8851591E
Infrastructure Scan ADDRESS: 0xb0ae8bb0dfb336a8b65b3fd4e76a56e0d60bb649 DEPLOYED: 2026-05-01 22:51:11 LAST_TX: 2026-05-01 23:32:11 | Compliance Status STATUS: OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags VISIBILITY: DEBUG_INTERFACE_EXPOSED |
◈ OWNER_PRIVILEGE_EXPOSURE An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! | > Execution_Trace_Log [SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 40. [FETCH] Bytecode size: 6944 bytes. [SCAN] Identifying function signatures (0x7fba7302). [MEM] Snapshotting EVM state before execution… [VULN] Checking for ‚Dirty High Bits‘ in address casting. [SIM] Gas used: 52485 units. Result: SUCCESS. [TRACE] Program Counter (PC) synchronized at 3873. [VALID] Generating cryptographic proof of scan… $line = str_replace(‚7a207a9072827cd96511d54e615858fa7f01bcc9da942c699ef1010677f08b6d‘, bin2hex(random_bytes(32)), $line); |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x653af6440720903bb12d70e3a0eedeae4014b751 0x234e91e9b0ceb2561c852b64e0edfaaf38d4f7bd 0xab1f4011b7fe8dbdda971e6f03bfc86777d851e9 0xc43dd00c9da89a70551115d8310ba8e85ca72ebe 0xf1f95b877251a0e003a6b6b95405f40037a50430 0x71731080801519274a01e59dd526b8485c18495c 0x478eaaaa1378e104c14b9983c7f06a423e742897 0x0c9564fdc9f3b3758175f60fcdc624059caeb4eb 0x3df13858960aacf0733f1ae77305fcf2847ee5cd 0x8f160f7df429607159b88b2ec8e03da226f27e53 0x27063fa824aa67bbb75c50fbcd2025c30e2ef968 0x53ca99a7f201f143a26d6db69a33cd02a113d5e5 0x1a7e3078a2fc12fb9bcc7af8728a490b10e0d25d 0x6c1535909aacc3a70744102ef0df86f792e3c972 0xf6d98ff9115f59b35661af34bada81c9da97f74d 0x9abc7f90044c06e9d3c68888f7fb4916e34acc3b 0xb6fdb683831f24e69998b9782c795fd749aa16e1 0x0961755f619cb47a99c1dc10c93fdf4c42c2a45f 0xd2b2947cb992344bfc4befe008ca62e21021f316 0x59edf1cce6b627bab3a19887b65416a7a36e26f8
Rate this post


