ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-225AEC013A6C
|
Infrastructure Scan
ADDRESS: 0x6a19566b64e536d243aeb98e73a8878961215142
DEPLOYED: 2026-05-14 18:33:59
LAST_TX: 2026-05-17 16:26:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0xe3f8bb25 successful. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Snapshotting EVM state before execution… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Reverting transaction at PC: 5984… [TRACE] Call sequence: 154d -> 645e -> c7ef. [VALID] Gas optimization score: 28/100. $line = str_replace(‘0x2c11d1c35bad0e0a111fc17d84c898442b754891’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3247b0ffc6f1cd8cc836fb74c853b839fa48297a 0x7f73e250b4d63628b72feed07090a8b153e868c9 0xa9c7eebdd1b29134dc1ccdd6f872f8300e4172f7 0x308a34e7dd71515a5b0251c3c37a7b434ef35971 0x335d24c11d5d81e062d7ed2d201ffe38ced238c3 0xa571d272e9994e5f28190a8843157c7478ed5f5f 0x898c6404431cfb8aad7eb45ce561bc64375fc552 0xcea4270079fe87ff89329e88612132e257af02b4 0x0ecd5176bc95d059e9041ea37b48475b00cd4024 0x0de57fd76d97094e3d0987d8721d7347088e47d9 0xfac4e34fa7491b453ccc8771965a0bc2a341732a 0xc72991c845e8c6d883eec5c1d4e7221c18e23fbd 0x3c5dbda26c2539334026d0c25e923ae48e884ef2 0x5889b8f21abf1433c4f4d44295c4a0410569f10f 0x8cba8d17a2a81039d231048875acb7c6b0dba46f 0xca0a59546730443a3af8b180b3316eb81e22bb68 0x9359dd882a4028ee4732d4dc42ce7a725a554f3c 0xa55c735e365c7d7831af227c93af8b5424bc27b5 0x1b80570a59792bd0ddb49c958e18dd92eb84bc4d 0x75d5e807f334430992eea49fd93c01ca765eddb1