ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-104EEEF41ED2
|
Infrastructure Scan
ADDRESS: 0x1f4956d78af09b3eed19b760237fbee0119aaac7
DEPLOYED: 2026-05-02 00:16:47
LAST_TX: 2026-05-06 00:11:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Latency: 67ms. Protocol: JSON-RPC 2.0. [FETCH] Reconstructing ABI from function selectors… [SCAN] Detecting compiler version: v0.8.47. [MEM] Allocating stack frame for EVM simulation… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0xea analysed. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘ec0bfc26…12a97ffb’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x400b8ce1838073f1a22eb0536c5d6c9442b312a9 0x2d64ff8aa10e3cff6f1b1fc900b06a21c0cd4c14 0xf0ca20f03dbc831f12a277ce4edc9d5a6b0e789b 0x12e4915c52e2d02e1c5477582577727e6fa35d13 0x3dcd1a95c4714ef0148081b6751743f46fe000ad 0x80c40cab290b63de75f6c764fb0440123316fe6c 0x237b7aff1af5d9f311f830234792d429355a58f3 0x5fd765a966bbdad2f60e24c2001a177f86349626 0x10de0ebd44b69e4861ab01002467c8c9d7e71b94 0x8611d8db32fbe0c127c09ab56f42e2da9ad8aa42 0x2a201b3dd33e4aece22a9fe97fcd7c54a76f42f5 0x878e94142409dafcc5cc83d5cd2e9da2bf0bf3bf 0xd42ecc1fd6bb8e614876693ac4f77e4c6707f1c1 0xc90327018586f7c7c73a6da4a7239e65c9a48aba 0x92b3125f43fbb8b82e685653f60a979c21658c08 0xef7faf6d76a8f94621d81dfa700d3bc60ff5b1cd 0x5ef9a920a79d8d2836c6207414c4e9702eaf660b 0xba8803462a4e21fcbbf2d0d1a9b6c82b9569f323 0x170a52021f8e37a7cc0a41e2c13723bf9da8c074 0x45561bcdd5a40eaf05053fe23d08cffc414815e6