ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1217979F7FCD
|
Infrastructure Scan
ADDRESS: 0xe7fe1f163a9748a049e7daa58a7593842d9b5790
DEPLOYED: 2026-04-23 21:59:35
LAST_TX: 2026-04-23 22:28:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 95. [FETCH] Hex dump completed. Entropy: 7.54 bit/byte. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Clearing temporary registers for deep-trace… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Consensus reached on node cluster: 4/10. $line = str_replace(‘0xbdc8ae2ac2ccdf8b036392930bc9670ffd2de5ad’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7a5ecc0553ecccd121d70cefa5554d2075a8b676 0x1d13739dbca3b4617e2e51c3d719e16970ee280c 0x5d3ad4b579d8784dc18a8cdad5e408217c37dd86 0xca411e0638e66a63b1f101fd490fafd7b9631055 0xd9d8ab3e28232d12573fb091dde3a0b68b15a7b8 0x236528b8be09ab98cc1e84acf91ccf0fa18cb3c2 0x96a2f5ba4ad875d86ad7b4f3601d4044f4f89cab 0x3bab8742aec1306378db7a383b1245f7866fdb6f 0xa43be76fb20af8ae8bb626f92f6f0153b170cf1a 0xb46fe7c0594a3f880decd249d081c2a7d9d6feb5 0x2e1f12422e35e0faebfbf5285f39cebe06ae3838 0x0210320f1817f076c65cd9b075107ab4d58d8963 0x2557b38fe883f6658325df76f08b9e17bd5ee09f 0x05fdbc0be7dc2552e52126b48445bd629b80f579 0x28591e2caccb5a8892bf83892f161165024b13b3 0x6fbbd82394245c9c8ad8fabe927a510e6829037f 0x1da3a8a65d5bf48eed2331ccf2211845e89b8429 0xc6eca4badd69d11b66e2a07fce558def61ac09a0 0x4c230881eb5404e2ae04e390e0a973d5ad281c5f 0x34c43849e03091af93535799b19f1ee9552b0456

