ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D973379C8585
|
Infrastructure Scan
ADDRESS: 0x222e95dfc6a2f76ea26f5a768d3a21a70735054b
DEPLOYED: 2026-05-03 12:11:47
LAST_TX: 2026-05-03 12:20:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Fetching raw bytecode for 0x222e95dfc6a2f76ea26f5a768d3a21a70735054b… [FETCH] Bytecode size: 5601 bytes. [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0x8800. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Gas used: 10763 units. Result: SUCCESS. [TRACE] Bytecode segment 0xd0 analysed. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘6430432b4d768d687d012f3d41192f3bc14556a47eb89780ec1914fde72b94d5’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf2cc8da94d1ecdcb75776c52be3d6dea603d8bae 0xcaf90198b0a95852033e49d2b935dd6c49feeda0 0x56f744934414a6033153a80fae3e2ef494a7e549 0x1d05ac5c1385f1b512391af68bb500dd31dd85fd 0x50e95f8c19c4c4f260a256a916f80550e3635f80 0x45268da525710f1ff995030af3ef6af41d017959 0x364146cc8167d7a677b038b080d2ff172bd009df 0x88e212f73fc8ecc6f460169e5b1d56246288d103 0xc206331df8692c93bd8c2c99201f83824a963842 0x96ee649d2f90c1a0b66120aecc588506839793ef 0xe1ef9a0db856dd7259b761b40ba2b14c462d4636 0xf9e472139034086243087454d11aedfe707d937e 0x6ac2277f59a1676a364cb903d3813289bb590a08 0xc5f61f959e7650fcd8862cf95e6ded7265c0df61 0x1b9bf98e4c24e406d2c5b642a87058fe8970b8e9 0xa9d555cfd497debd0e971b99ecab59d5a48172a0 0x7d0748184db6ea2046b5abbe1a925f2fa97a1cf2 0x4c68c07cfa86101663deaf464e4ac63168af345c 0xc3848cd5bb4c507f65be6ca6b4ddac721be11d74 0xf9f219fe4969a9f41533920d8da310725ffc2e05
