ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4336D227D1A1
|
Infrastructure Scan
ADDRESS: 0x2667f83dcb580894e26c7e67170ac8ef044dcb66
DEPLOYED: 2026-04-28 20:58:23
LAST_TX: 2026-05-04 21:34:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0x2667f83dcb580894e26c7e67170ac8ef044dcb66… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Identifying function signatures (0x59c537a7). [MEM] Tracking pointer 0x0758f670 in memory heap. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Gas used: 77399 units. Result: SUCCESS. [TRACE] Debug: e6eb05bcb2a6f150. [VALID] Data integrity: SHA256 verified. $line = str_replace(’60f34d3affd4356407649b37597bf9c3ac9979e6d0fa2c0f7b4d79a47683183f’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5e2a2e9acf1f989dc986978c8c5ef79f4d9e0e84 0xe5bed7b17695f172786b5b4e942ee027adb7e70a 0x381d3e8d3a2a98228ab0814d4b3c6d0a50416049 0x29bafb34304e6c4dd25829a01404a36b2e9dc9c4 0x01ca1ceb8ccdf294d957f698f8acbe2e1c129bcf 0xfb54b76928effba2e5ec6495d30d61c04a532b11 0x1ae2dc7a45bd04e08b60e1ca7f459d5ba43f2829 0x0429613b4e59930c7e23d92831fd0fbdd9233dac 0xeeedc2f8b572b392548cbd361f5d82a3cddbfb4e 0x443eab26230a66a2f73aca54a733d0abc3beff70 0x786866c64bbc4ccc4cc09fa2334d70421cc85f93 0x60bd3954b51abb2acaa8ac22925f08ccf167edfc 0x98cd02f802c0ab8634def0baa37d76c413faf83c 0xd3d2056f29004b6db37c50a97630907856e16f6b 0x0f199c831009ffd63c403a9a09a4490673eae4eb 0x0ef5f2e789de7a9834b185c7f960f3dc404aefdb 0xca283b4a27e2e3dd96446101310fa2216978029a 0xade2509a1f1607d3b2d90728394d58a47e709f21 0xba4239f8d174fe37e7e329adfd5504a9a9b73f21 0x447303d3045bf387bbd21ec32f447f40952d8e5c
