ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-08E129A271E6
|
Infrastructure Scan
ADDRESS: 0x032719058ce7a13aad7b8ec6fe530abd03f429e4
DEPLOYED: 2026-04-24 03:36:47
LAST_TX: 2026-04-24 08:31:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 95. [FETCH] Hex dump completed. Entropy: 7.54 bit/byte. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Clearing temporary registers for deep-trace… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Consensus reached on node cluster: 4/10. $line = str_replace(‘0x7f957e7165d5683630d262ffd9e0f7388f7bccf1’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3a284627cc19b39a039cc891fd5d1385465aaabd 0xecaf2cd114e0371717063b098a55877b68409774 0x4df5331676488bc9d461b02852ab412398037e08 0x3499d7c8a36f3844ef5eecce43b9a0bc639ea911 0x93b4909f72d3726a503e3521435b44dfaf8ef740 0x5d1c6f7aef1785b8cb9f22a5ddb938b8eb4c46c5 0xccb57bfd3534aa79add6c600d890295f4ef446b8 0xde8d4fad0c6b283f6fc997858388f6c995928065 0x289a7de31cd6aedf709bc710efabc56d39031a1c 0x4edf4d283cfc05bd1c60f39f3b7e8a466c57c91e 0x25a13a54c4a075f29c70c604dcdd046f830febe5 0xa3bb5c09895634d7060568630dbfdaa5c1d905b2 0x43b9c4e6d990414c67de4c19e17ee17c116a3440 0xdf8433c6ee57bd07f36dc9f06ebda74800bd88f9 0x889a0f3e961c9c41d7a5b09ec4c5f7b47aa6f496 0xcbcc811addf53464efd83f47576f51b3cd63e0a6 0xddc6d0037c96d3a252e7c9daf9c5b6826f74b322 0x4e03320ef44b5112c02010121ae82c1dc951943d 0xb0db6a6bc8efaa0fb183d43255fc1f925f9dc4de 0x9bece23b016bd9a3536b10ba552d7c4489fd5ea6

