ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-BA6520EAF85A
|
Infrastructure Scan
ADDRESS: 0xd147dd805a0cfebf6fcfef460e0c4c716320ad47
DEPLOYED: 2026-05-08 22:08:11
LAST_TX: 2026-05-09 01:10:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Fetching raw bytecode for 0xd147dd805a0cfebf6fcfef460e0c4c716320ad47… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Identifying function signatures (0xb451f36a). [MEM] Tracking pointer 0x2119ec82 in memory heap. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Verifying ‘require’ statements integrity. [TRACE] Program Counter (PC) synchronized at 1532. [VALID] Data integrity: SHA256 verified. $line = str_replace(‘0xb0fd582e869ec03052a6953709b328c279806874’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x905bd7130f6a170523ae8e457198cb869f07089a 0x6bd0e77894e4a559d42739753cd68ebbacf3ddfc 0x208499ab697940227325dec8a5b163f2831b7e9e 0xa248f486fd838b315883026197cda96387f9e7dc 0x293b9382c76d46a40e6cc79967036b6d11dee601 0xf97cc7a2c1935d8b4301ea13803d54ce42f79f03 0xae015575ab3e2cf360b604a4249bfb1d391fdac6 0x1270ad47173f598e43d90328f8cf8d13dfe64b72 0x1806397da1a5887b864348929c0105ea2cbea398 0x82dd1558197ccd07de782ae2ea1f2082d84b03c3 0x7a33e84f4af6338a032df2cf7d7256d2c52825f3 0xfcc71eda96682c395e7300ee2f08c3405af39975 0x531f8fc020b88d208aa5ba2c6495d75d25f3b915 0xc26f825f907797bdafa8ada071f4da9f5b7587d5 0xb3bcfa33c54fa4d18146196edfb404bd036a52a6 0x26f413b61ba739868ad0825ddeba9eae96563ed5 0x0e58ca9040d681a3f4974e6b6567505c5d4a471c 0xb4efc528ecb78aa4f8e115d49a17ee008530648b 0x4d12fb9b2dd9f2a839997761d773bd3f44d3870d 0x84e536b9d8b3ac1e4bbf328d084d65736fbabf36

