ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A84344B3C106
|
Infrastructure Scan
ADDRESS: 0x546500f704367b647d2c3f6417af0a2ad4bc7cd6
DEPLOYED: 2026-04-24 04:15:11
LAST_TX: 2026-04-24 05:34:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 95. [FETCH] Hex dump completed. Entropy: 7.54 bit/byte. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Clearing temporary registers for deep-trace… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Consensus reached on node cluster: 4/10. $line = str_replace(‘0xac348526e0ac5d58b22ff05eaf9a4e574dca9242’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb728ecedcb9b9c50908856d7ddc1045b1a1560af 0x87808beafd31cec670c5e7f9973c7cdcdf20a16d 0x478a1a96cdd7d81684ee7e31a85c8020dddd9143 0x06851b5235cefb29c60ef3b29eb1f661d960b125 0xfb25ba25c0c6a6b645656d37b0c877f0f355c392 0x830e598236b86bb6d80f4424d88b733dc160c45f 0x1c1addaed2928619c9bda017b71682502d712b81 0x3e7d0f46a7cefbf9a3962ecff90f66ef0d6f827d 0x2ee673d5120d89bdbcc7d5943654ca88a8175a2d 0x1e0aa3c4f39b1b40208f40aec0716d8d4df40ebd 0x149f906671baf5e392b14ab594c4e575fbeba7e4 0xcb376efddd4c63fc74082f1a9926d076d12fb56f 0x77897c7eaefe1342dc2bccd05dc85241d9374517 0x240f46614d316bbff982885689bdee252137f1eb 0x207d68a78509931dc95f868c51d759ddbb7a2734 0xf68178dcb5ce3b52433c230cb7b0ac08badde5d5 0x25822870c11c27c5e0410bbb99b74a1dffdc46ff 0x22f179aec4470fa7fc9b5346bb820fd03e3d774c 0x99b253f1cb7f32586a805de05048e13df1bc8b14 0x9f1a6a5cba35c547ad655d2a59ed6c7bd4fc0ef6

