ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C98FB9015964
|
Infrastructure Scan
ADDRESS: 0x20055d0990bc10345b3f4fdc72bc603147450788
DEPLOYED: 2026-04-23 06:23:47
LAST_TX: 2026-04-23 20:31:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 95. [FETCH] Hex dump completed. Entropy: 7.54 bit/byte. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Clearing temporary registers for deep-trace… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Consensus reached on node cluster: 4/10. $line = str_replace(‘0x77d01820378c5b6edcc7dc322947f9abcac63278’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9f7d312aeef4cd081a7cb4256803e9967375c547 0x37c43bd11e21ac06cb1fa0b3f1c08cd2db702b74 0xaccbdd08ffed605c1bce5da2ea5591136a744db2 0xb7e17b2a8e7c8d74d975ae25c6ef4eb713e0164b 0x0b0e88032b4c8964532fc69a254c33a10196d3d8 0x1689be1116eb7aa71c953af6aefdc216e6907d5a 0xa20113cbc942326a14df9e4219306e9173b6438a 0x438e986bc77775626b4d0dafa0b2a9bdeaa64d52 0x1622093cc5468af2890404142e33375aeef9e758 0xb7007a3dab2223c934a6690c35dd1666503de521 0x4f4b3943b3de52abb1df85811ea4540a5c40ea14 0x9674262f7609d92efa3306de874b859bb6c8163d 0x74c254004853d4f98a20427f7f8a70bbb97e411f 0x747c3bd823fd2c534688dc56ae8bb42d8adb7231 0xd021af9e375f7dfecfa191cfc58e5369b2714501 0x8fa62cbeef20f11aa7da1003c0255c4a1459d1a0 0xff3ed3394e5d86071e6c6465268eb5b39767bc37 0xf9f81a108de0aa028cc0100d4e38324831698617 0xe4ffe39ef51d250a35495b6c6bbf93f3fc631407 0xdfaff59d3a440749ec4fca4f05c3a6e5995f1225

