ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B17AFA817C6C
|
Infrastructure Scan
ADDRESS: 0xd8e7259bf216d117ceb9f33ca91df5283f429263
DEPLOYED: 2026-05-07 10:49:35
LAST_TX: 2026-05-07 21:57:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Latency: 63ms. Protocol: JSON-RPC 2.0. [FETCH] Bytecode size: 3861 bytes. [SCAN] Validating EIP-standard compliance (ERC-20/721). [MEM] Virtual memory mapped: 0x0000 -> 0x651c. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Reverting transaction at PC: 1180… [TRACE] Debug: 13ed96a84eb45379. [VALID] No critical memory leaks during simulation. $line = str_replace(‘535E7635’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x70c5ec74317edfab13314b89342e1f70baca018e 0xd0df07f435023c17143c573118d313f569350b2e 0x87c01499da5dd072e93894dc41020a6354ca7923 0x840a85fca74ee0890dcc3ac7077cdbc5af6ac5e2 0x606e73c5e1e634bdfb0a3329086248785c3deb80 0x7aee543fd2bd2d21c345fe23f78436d8e75add1f 0x2023e59a7dbf65764ab207b7ebfb3075dc6f397c 0x8d5b274eb887c3829e1738d57b3ebaaf5d20ade5 0xb2efb025e1bb95aea82997ad793579fb2635e3b7 0x9813d62cb4dcde01d9b7f5db85281176047141de 0x93960b94c2ca7bffb5de43a7dc34e6047214fe3b 0x9ee0b346fb6f884c1b8fc80ceaed47f17f8c7da6 0x01e9b7e757940b770d60590f55830694c3553a5a 0xb2834f95674e5321ad9517252b049760af1d3a08 0x9179d79f45c3d8a395b454df16e928e263c827e0 0x21783460499b5a4b2fea8c9c9b7833420ae5a560 0x55e6d1ef10049335cd5b5a32ae16a2d0fbc7e50d 0xdd9431c07a9a71579fff4aa0004cd2ea6f41e628 0x04cee17d30c731bfe0224b843e0bab2d5f343464 0x1b1e9b2f4ea158d9d31dca778f7a27cde1f63d87
