ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-37216C699AEB
|
Infrastructure Scan
ADDRESS: 0xe95f0f0380399660b55389f5742b84e382526b44
DEPLOYED: 2026-05-10 10:52:47
LAST_TX: 2026-05-10 11:32:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Pulling contract state from Alchemy RPC… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Testing edge case: Zero-address transfer… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(’92cc3b31…0a8728c5′, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xed5931786d1c3900a1334a7b9bdb6adf04d86ff8 0xba50920e2893b2784d99ccb2a1cf26bdb41720fa 0x9ea26e1fecae474e427086407abc373c14368af2 0x7340a2dbf6a60ec3bb3d94f8a321313f27c884c5 0x8d53174b4b621ad3b385535d41a821181fd9e5fa 0x3da9769d50f3db9fa87422cab3fd4a0225c2ea1c 0xab5a0055e6bfdc7ae3f1a38a29f16bc9979fb783 0x8303f7f2db969182a84b40d8822856150bdfaf77 0xd49dcdcc1fdcf7df4df54b1aa01aea7eeb78be96 0x64684c179c0a0c91f9d55bc7e78915f0caf16fa3 0x84c9129a70ee642b6457b24ab39acf4ec3007e96 0x4faea0c8cf0b8e95704ffb773012aab77d097ea1 0xb4ffbcce990a9a0b5f84722ba2d5db4e7bfc9d11 0x656d2c7a970d13073a6a58fae18f39abf31fae41 0xe48f19b861e30a677fbfdf36dd154da6c9049c3c 0x2991c6fc3250378b1bd4edda4d59428ae74de85f 0x39181749ce71f8f7268444a6ca8b455256d20de2 0xaa59d8ff3579c112ecd066803241f7923e4afc09 0x09b5d162cc47c7dc86db980c19363ae57d0e6d50 0xf714223bfd2bad25bb4014d57606ee8e9bcc4df4
