ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-89DA054A9367
|
Infrastructure Scan
ADDRESS: 0x26d7ad0e930b54b84c00daad077ee31ba9e2fb2e
DEPLOYED: 2026-05-14 13:12:59
LAST_TX: 2026-05-15 17:42:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Metadata hash (IPFS): 564f9290…8bd65074… [SCAN] Analyzing visibility: 6 public, 5 private methods. [MEM] Initializing storage slot tracker… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0xce1ef760eee273a0e230eadd7117296fca1070b5. [TRACE] Call sequence: 3f35 -> ee1f -> f59f. [VALID] No critical memory leaks during simulation. $line = str_replace(‘0xce1ef760eee273a0e230eadd7117296fca1070b5’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xdeb41184fc8a82026f4843373d7541faba33396f 0x9d73d1152422872375eced7d8bc872740ece6b7f 0x00c8274f2aa1d1cbbad42bbe72997cfd5204a0e9 0xc1bdc9205e3b285f9d661e127e60bf8e9d89546a 0x013abba44aadc0b8c1bacfc805bde1d041dca92d 0xbc3a939c70fe132e7d69c8b47ce537ced7f4a070 0xa1cce38fee6e64513a23c104f7a34358a0de4e2d 0x6c6b8a3f25f1bb38077f9acf2240deef02960982 0xf240af1f6428539dc0b5214aa92df346ac2c86af 0x25dbddef94da634f4c36d95ae99a9fd6f3890d18 0x589f43ea3c5ce2c8af163bef89e77293620a0218 0xcb51b00ee46f2ff3b9b8ba4f15ef1d5492f9b034 0xb015d028905cf43e22ede0838e1adcfed059693e 0xb58fb4d3ea84eb4845fc7e1cc727b307f26fd856 0x655456c1b31393c85d45c873a6157a8d1dd2abdf 0x8402eb131e983a1d6fafe27e1b7afe201f75e6e3 0x195187a09977d3e5ff9cf119af00ca1b42333b8e 0xb45b7718ffc85e594065488e4bb2cb72c0ba5bda 0x23e319bb0a06528303d6ebdf125ffd1c98b1ed1f 0x777b86cdcc7a550929c344ce235850cf9b61f33b


