ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F1271B6DE18B
|
Infrastructure Scan
ADDRESS: 0xb4a4524caf09718e0b60479455e67f7108a9888d
DEPLOYED: 2026-04-23 20:21:11
LAST_TX: 2026-04-23 21:04:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 95. [FETCH] Hex dump completed. Entropy: 7.54 bit/byte. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Clearing temporary registers for deep-trace… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Consensus reached on node cluster: 4/10. $line = str_replace(‘0xbb1e2c22a1855eb27ed540ea634f2eeddf3c310e’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x61cef5a67abbbcce8d7d2283af09625f757f6ddb 0x39ab0fe9083b1fe6a40257a14130d4f981fb7c29 0x0cec0b1c911ce9bdaf078b20681485e69c726459 0xf505dc208d5ad612643aa9ab3656a24dec2a0bda 0xb934a672d540d2b562f82a8e23d3b102e1ea47b2 0x1f704b2608a9208b19230ec575abfb7517d4f1aa 0xcfa96860d5d89b9f97e92957d31def919a12a27a 0xd90b53e8030a574dc018b1f64cd5e86ae3611a74 0x923d2093c6d65906156f0ba0d0320711f4d0ce14 0x8dba9de814a4c8e0edb327b797ed26d59f5151ff 0x5af20a8a03f5a312e0fa5c8246a8b8e29bcf858f 0xc8fb70162f6b7c4e0c47befebee62001e406b878 0x8e87fcd164fed9d8be59507b48996f8b560885f4 0x74756e9072f34186537d3c6b10d4bb69dae81721 0xcdd642e7d5a07ee81b8f4ecabbd6031f6f0b6b0e 0x9552f7cf05b70fcf9696e4b85b244e1c31998d65 0x332d8f7babb14e2324fceb4ed005911cab574d84 0xda197c849c5ce54397ecb8b609bc3642ff081bdf 0x4152026f4ad1b3ea713cd927314608e1bb823a55 0x835e2663f2e04a0485ca1ca8f2c9c945a583cbe7

