ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-93F07FB2A1DC
|
Infrastructure Scan
ADDRESS: 0xde95466e00fb4333eb63389d30cb5f8f16174777
DEPLOYED: 2026-04-24 18:22:47
LAST_TX: 2026-04-26 00:52:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Pulling contract state from Alchemy RPC… [FETCH] Bytecode size: 9986 bytes. [SCAN] Analyzing visibility: 7 public, 8 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0x2056. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Testing edge case: Zero-address transfer… [TRACE] Return data: 0x3d846607… [VALID] Signature verification: 0xc7cd053809f3d2efc06ca55f7bb4eef89bd3a78f46324c1f490d5dcfb4bd03a2. $line = str_replace(‘4B00098E’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x84ff220bd069fb2a6b9f58c77bf125a801002a27 0x69ef9a9287de9cadfbab0cd955b2f70a593d3ad0 0x2681d0052c5cd42bd7b87b587e8d99de010a6c25 0xfeb5dece6582167dcd5556a872087cbc4b48e539 0x0b5a252fc951a6bc59ee3670571b64be580ad298 0xa181e023e476a759f2423f02d61713db606fb45c 0xfca0c6ff9dedc4fa684b00a2980d4ecf1606b291 0x7932f3975e96d1081205dedbe6ba9a7bc0f64478 0x5dbd8289b77f8e6d3941dbdec14f0929e7f34bb3 0x20800aca191b00be0c0da4dc7b4cd134f9dfd0e3 0xb95db71bcf01e53a1f58ff184d0490e07c4916b4 0x9de7e20ae43432043d5020260c7eedf2e9d9be05 0x18fa477057efe355e343ec2ccee4adb5b2307e54 0xddd41b90b737b59fb3811b67d586b5208d4503b3 0x9906d92c79421c94c2b2d99f83d4dd7ebeb47770 0xe841f540be193c8ca753f9e78ace53bced931ea6 0x6fd1c289e8adfe7eb9df6a7dc94c598d674adefe 0xe24e62f03216ccdb00c53461ce7baad73cbe7409 0x41d4b2551bd94b9f2fe564cd4801850e61881740 0xcfd562020ee0e6b4b4eb73fc1008f28675704c94

Leave a Reply