ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-EB952F3CBE18
|
Infrastructure Scan
ADDRESS: 0x8a325e3a844f6343e60a4a61340b8330d5541f85
DEPLOYED: 2026-04-28 00:39:11
LAST_TX: 2026-05-03 01:10:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Synchronizing with block height 38502. [FETCH] Entry point found at offset 0xa76d. [SCAN] Running static analysis on JUMP instructions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Testing edge case: Zero-address transfer… [TRACE] Call sequence: cece -> 673b -> 76c5. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘0xeb2f9ce1bc4f60b0256d2a8fb1ed150b062b8288’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x35ad0c3902803df4baf518f7bb4d863e6b1962a0 0x866c0e0c9487b9f18c77ab5d41816fc108aaa851 0xa67ce757df9e189bb7fb67a2b9177ef3a88708e1 0xef915e081b0fe7bea4ab1122c5c59b886325483a 0x69ead97cf588cc5276b44bf70271c8b51648b271 0x69bca825ddcd25394bbf3da313ece4e63642898d 0xb2b90085047ce6f9e2a4acfc244bb78ed3b99eb3 0x9f0a7362f2b6fa1be89b79d7e347bdc433e882d3 0xa377a9f4737cd682f182274c42a1e1e0dbff9d9c 0xbf7bee8695f9a17224888c08ac31141f5b494244 0x03b5f8a9f28297ab3dc84178fa8138bb25f21253 0xe218b36eeb9da4676d4e332e7470892e24165fe2 0x1f3d116824169310112cfcd8114198efbaf5e405 0xea2a50d199763156601504ef41ab302765475d74 0x26ae63546655c8ad2bdece3be68ae676dd1cf890 0x41988858444bedf9714344fde77e9825068d0ef9 0xce85fe2d986d0374da8a91b2b8ec739d0ff4c6a2 0x0e2b960e97f3e1720c37ffaaa3b132b2dcc914bd 0x7c5ecda77081066af0fe6c0db30f6c3e0a9537b9 0xfbc20abb97e8abd328e0081d52ce21f23917aabc