Category
Date Posted
24/04/2026
/
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9BDB9AD10278
|
Infrastructure Scan
ADDRESS: 0x863ca27dcd7715ce7121f5845235461711055d20
DEPLOYED: 2026-04-21 13:00:23
LAST_TX: 2026-04-24 12:24:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Synchronizing with block height 93538. [FETCH] Received 44 segments of contract data. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Virtual memory mapped: 0x0000 -> 0x8aaa. [VULN] Warning: IS_DEBUG_MODE found in storage slot 25. [SIM] State change detected in slot 0xfa. [TRACE] Bytecode segment 0x22 analysed. [VALID] No critical memory leaks during simulation. $line = str_replace(‘b6bf5862…695b3eaa’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x48b45eb10698f33efc950fbe764bb404dc3b7bb3 0x3aade18fccfcb83c7ada6ed0e0c6eed936d3ce02 0x3b77dd5da2d023f1d9a07bc76c4d5f897438ec72 0x824584a081949044c05df400126fce7c17d5fd53 0x5d11dfc3aed37bde9fb2d7f640faf832dc7dbc40 0xd1303f71aa8e4277f45dd666d0ff02390325bddd 0xee8aed4e32ac579c2286404c7f526083e742d28c 0xb9e9d8170eaf140538f343371c43f1f3da86c646 0xc152356b4059c3c42f8adad6bbfc98f1c375d823 0x5fd69336ccfbada555ec91a5a0ddf108447797fb 0x8b3c31db97ea8e90c36d384cbc637196a2734cbb 0x6bab1f64fec0377c79d6cfdc9b952da758539435 0x39b55715da975e4b645303bb9657ce4496c05cfa 0x371d71e0fab98a4c400a80c06cd327c1a0ac6b41 0x7fc1a8b598b5601c04b0ce1ba1731525722fef38 0x662cacfd597bbfdf9d8a4663ac605dd60602f96b 0x0d6deb179a6ce8be16f87f259cbc8deec3a8538d 0x6004c7dc267f7529491b81bdd801dfd3f20b4fa1 0xdf2248684ef59b72b24bb7ee3fd6f772e75af9bf 0xaf324cec85731dc26291b715cf785830ebbeeab7
