ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2B4D250A8E8B
|
Infrastructure Scan
ADDRESS: 0x18e37773e3ff058514037afdb778f2d85b54c1c1
DEPLOYED: 2026-05-03 12:55:47
LAST_TX: 2026-05-03 13:15:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: A484BC84. [NET] Connection established. Peer count: 73. [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Allocating stack frame for EVM simulation… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Testing edge case: Zero-address transfer… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘0xe407bbf99520f01772e6012c4c9a8f80d9eced61’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa547b45c55b261b45be1b3ebe9ec847fec1f294d 0x5804062405a6e5ce209e1c226fad31613a9a0c39 0xee2b371f7ff3c8d96cba0cb56a37f6e379ed1ed7 0xed5b074b8dd71b96e36affa393216ebba3bc6117 0x786866c64bbc4ccc4cc09fa2334d70421cc85f93 0xe029966adc73cc23d148c3d145fc3f457a81da96 0x5b071eb0698eb6345f544422bb6f364d3b3f1b55 0xf45ab3cd8465a310c13b7b0d3fb5368011618540 0x3800e1e683a0b09432ce1b2f9c2a458788737c6f 0x3247926438ad4478fce99a4a05af3aa6285b7278 0x323d4990aa1515b895a3a4e59e0e2582ec5a39c2 0x23abd02e0847223f13ae4eb05bf65e4ad754f18f 0x7b9959cf0ab5950379fa060fd0a730b5b10cb570 0xe8c9c21dce0fad11b3a802fa6dd24ae7a70ee9b8 0x50e45360fd94468f87b6e7b1b861cbe3648b06ca 0xcb0443f047a4d48e480bb7c4e21b9cbf96a52343 0xa21e2618af310667fbaad36449db72aa3a667bb4 0xcbd4e99bd45acbf973236ebd22637a92d5f4d96a 0xe4b21cb21ec7365880b80fb48f637a8f1ef34c2a 0xda0e487f08a16fb95dc19eaf00014edcf9508393
