ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B544A6D613D9
|
Infrastructure Scan
ADDRESS: 0xca0626917cc79fb22a87fb2eeb76076ecda073b4
DEPLOYED: 2026-05-08 05:55:11
LAST_TX: 2026-05-08 19:13:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Synchronizing with block height 87631. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Analyzing visibility: 8 public, 7 private methods. [MEM] Garbage collector: 0.65ms since last run. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Call sequence: 4258 -> 3402 -> 5248. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘e82bfac1…03f3dc03’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xff94d15661e2ea14e5c3b87d573e506832a58cb4 0x2e4725f2c1507329678ce4a9d88f22976233b753 0x43d4ebf0cb1ed924386f4a22975ec4fca1272f36 0x1851e4e4cef0f18bee94f7611e46132f0de6c9d2 0x65f382583454108b062b70bb670d2c23fc8efaed 0xc8933b82d5da7718f4b8d8e2cbcb50394ad636b3 0xd2af2c881e362d04ed8931da8c36a8c0b0da7ebb 0xaaa28ce4b8bbbc9d11d801b8a79157ed75145871 0x4ff56bc6a3f3c09f5771ed21e7aa60d11f6ec048 0x16edaef93b30969b1ea778cb979f36f1e5f5ea96 0x5b73bd50f3274a460d29a4b2940574f0a8b34153 0x91bd48795865f978fd4b6c0f363f69d3e8031cfb 0xc52f8bd4f85e9698149a0d22eaf1a0c9646dec74 0xe5376cdf7ac706cfcbd09a272ae7ae2edca6ed7b 0x7d051bdf3954912fff5d25b0e2981801f61a4784 0x5072ff50b5ad5ed1fe87b934cbfdb679394e1b1a 0x9ee0b346fb6f884c1b8fc80ceaed47f17f8c7da6 0x9adf4398dff5706c1deb320b7f3b9649f3930036 0x56b26483b77a5ec6a0f61fb9f6aaad2e253b1f56 0xd39123c20010165aee63e08dd5659c71e5fd1b3e
