ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-81ADA493B618
|
Infrastructure Scan
ADDRESS: 0x03bf477fb64f228c3b8b48e5f34a1c4b28a52ed3
DEPLOYED: 2026-04-24 00:47:11
LAST_TX: 2026-04-24 01:03:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 95. [FETCH] Hex dump completed. Entropy: 7.54 bit/byte. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Clearing temporary registers for deep-trace… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Consensus reached on node cluster: 4/10. $line = str_replace(‘0x7113eeed9959008567fa5be785124e3489933a2e’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3b77dd5da2d023f1d9a07bc76c4d5f897438ec72 0xc597791751831f33dd6f8422e4f6c7215047466c 0xc184d76d1805783312d43ab9cb981e1e63d0562e 0x52ba3cee967340746e9385ce2f6cb2da3811eaf3 0xbfb51c1daa41058dc31335acbed292b5af86dc4b 0xb066753f47d9cee6da204e6f8622b0536521e5a8 0x10d2573263aba1ca461ed85d1251fe125bd26a02 0xb3939d2de57802dd4486c56a7a473e06e5ef4c7e 0x15ef518990a991b5d8ebab8373d9a285891de72a 0x74086465fc0ec765fc38b92e0e94805000b1ada4 0x996ecfb327a33d103bff20d7ef18e9d872079a8e 0xe2613574b5a00ffd75151610224cba08eac49337 0xa3e975dfc6f1edd69520ffd4eb2500115530e6a8 0xaba7db2710d8cc0c18153a920fa39df5cb026a70 0x550b738420e096a6c3d636d5b42e31c3964c4765 0xc96d68f3498182bc187236572041c72623d87223 0x365c0a8c01f97476b03b77473138297c403bb521 0xc2c2b6ccf519063d9f1b40b8a2b92b95f05a4fba 0x8051c111cd6978396e4f81cd81d21b1ae8be5a08 0x1381636036b57e7fc450d3214bc38cd59fb65176

