ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2E120BF1F3B9
|
Infrastructure Scan
ADDRESS: 0x82373d0777ec757db1b3e83287f4e8296a44053b
DEPLOYED: 2026-05-14 13:35:11
LAST_TX: 2026-05-14 18:21:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Pulling contract state from Alchemy RPC… [FETCH] Entry point found at offset 0x765b. [SCAN] Identifying function signatures (0x184812cf). [MEM] Stack depth: 4 / 1024. [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Gas used: 53131 units. Result: SUCCESS. [TRACE] Bytecode segment 0xbe analysed. [VALID] Finalizing audit report for 0x82373d0777ec757db1b3e83287f4e8296a44053b. $line = str_replace(‘F13D252A’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x333cdf6ecc9cdace766c0ad209c2386e899398ac 0x2a803b157db43b660de87bb2df8f7f45a95d67c9 0xa77a599f848b3f2dc55fc64b2bbe013ffbc1d5b1 0x7f0c3a2641678b32ef46b7988061fa611502b7fe 0xfd41a6c6c732c4cac9356d0b74f70e6eccd5e375 0xd088c8007afd73e2c7bfeb1732ca36b7bf04df41 0x8e543da9fa6945303dd961cd8c0937c41164d8ce 0xdbca9651c2fc5d9ff38d43a8b7132ee18d66db8c 0xdf35cc8be4faab37f8ba28e435d7b20851345ab7 0xb5371cae893e583343138e2e970938790cd3c819 0xffad1ac0abf099fe04e500de2a89733f3572cb1a 0x59db3aa3ffd79252361ed8947b4b3eaa55428675 0x84ba46489f45f49fe7691902affe4d7d9fa0df6f 0x187314abdd4bc00ed631572f0d7e79cf55386d2d 0xf9a2f7652973ccc53e4765aaa1cb5178887ec01d 0x502229f0687c173495e2cd67378fd7cfe3289f00 0xbcfc03cf50e0d0b227e6aa83eda3a8d4472c8769 0x22d6b34f5c4bc323eacd59822f2844586f0bc70a 0x7fac0f2c613c4b77d1e65e200d5207bf74986faf 0x86d905657e0f606c9b23cfd7210da04ef6b570b6