ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-31F9F594C281
|
Infrastructure Scan
ADDRESS: 0x0c5d12ba89ee3f76f9f23b91b1318153025d728c
DEPLOYED: 2026-05-12 16:14:11
LAST_TX: 2026-05-13 00:37:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-6. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Detecting compiler version: v0.8.48. [MEM] Allocating stack frame for EVM simulation… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Execution path: 11% coverage. [VALID] Finalizing audit report for 0x0c5d12ba89ee3f76f9f23b91b1318153025d728c. $line = str_replace(‘73679d9e6105327a8045667260af8d74a1ed7334a3e9771baea4c42293b06e55’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x058001330952d9d7e0aa80552aeb550b311a7aff 0xc03044bd62b2a5cabd7b5fbcd0491191fd7ac575 0xfbc477bc9ca74e702a00c3be6e040eb9c591a4de 0x250e805d3cb8fd913a40c72471739c98ee875982 0x15e88b7c231a70f3563f0540fd91aca2daca40ec 0x1f88c0948f3ebca4a2c8e0958cdd10bcab1bf905 0x439e217031060e92fcae503e5c0e4e6268d69fa3 0x06b1243cf8185706cb8b97c25925e96cffbbba9e 0x9a56c59453a2fbae01ba46045441490e5c7a664d 0x4188a5b32f2f9b32fe42fddfbb16c304703dcd8c 0x556a3485b6b430914b248da5541a21d198d398a6 0xaddcc9ee3ddf6d5604e46d911d90250a13cc98e7 0x8d7d200935c47150450f39ced6db02bc90f14c4a 0x22d8509e7af58b1eafb311f8f76e81dc3a391f77 0xd147dd805a0cfebf6fcfef460e0c4c716320ad47 0xe5706be2b141aff3260551c1a1aebceeda85e2dd 0x49e9be02e4939bc5ac517bf0c2c7fcd9a33f133c 0xe7036e82aa3fd1324f3981564f7301523c59ffb6 0x593b2e05c4e81926f29a468b1db4621d6df017f9 0x8599b3f3fbf81d7a799e8727a60765e4d5e8324d