ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5FDE8414306D
|
Infrastructure Scan
ADDRESS: 0x81b01d0f26a555692e1ebdc9f9fd2017f099586c
DEPLOYED: 2026-04-24 09:25:11
LAST_TX: 2026-04-24 09:33:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 95. [FETCH] Hex dump completed. Entropy: 7.54 bit/byte. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Clearing temporary registers for deep-trace… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Consensus reached on node cluster: 4/10. $line = str_replace(‘0x6ba06a1772ebb5e2e00f3255682591262aaa0cf2’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x63c877f2b39ab954b2327b290203c3146177d898 0x90d9e3b70baedc121353cd073e583c646ac21c37 0x3427176b40c71827ed940ccbb149fe390813f2d6 0xe6cbcbcf797240893718555c062994c93701e031 0x64ecb16e0de01dea5b73b9453a5892176f79b889 0x0d32fb008b44ddf52d235a33ccee9fddecbb0a8e 0x137f4551a86e114148552a5d5cda310720154364 0xa3bb5c09895634d7060568630dbfdaa5c1d905b2 0xb22565bb3de0315e26539e10f987f56a6731b0f0 0x2568fdaa22c2be90a0d272b52484f3a612cb3291 0xb66022a5e1cc31d1b1dd79d75d99808515b0e88e 0xed75ffab483b44a8c872c91432994aa6a05b954b 0x14d44860f8477510d40787df4792018c10bf7cb8 0xe0b93274bdacf7fbcac4eabede45914823221ab4 0xacbf05153bad606f90aaf272269b50280aa369f9 0xbd66b116bbf2b76e6f2d26f94979fa2732a0df93 0x65300d3f8f5231eefce67138a45febb506a7d381 0x96e26ad99420848d47fcfacede518a0906ca326a 0x044a177a11ec1e1d342f720bfa23c20fe6d625de 0xfa8682dd94f941acc16df7284b0511689b05f54e

