ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D10AA4D6E980
|
Infrastructure Scan
ADDRESS: 0x58cad2ed286b3c2c3c6e81dd77938b319bf65d64
DEPLOYED: 2026-04-23 22:44:35
LAST_TX: 2026-04-30 17:34:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Fetching raw bytecode for 0x58cad2ed286b3c2c3c6e81dd77938b319bf65d64… [FETCH] Bytecode size: 8858 bytes. [SCAN] Checking ’immutable’ variables and constants… [MEM] Allocating stack frame for EVM simulation… [VULN] Testing for ’Reentrancy’ via external call trace. [SIM] Executing dry-run for ’transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-A258F930.log. [VALID] Consensus reached on node cluster: 4/10. $line = str_replace(’bd5ed1905fa2d0e20c1c1b422af905ea3ec3acaac88229290ef0b01ae397ab2a’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8cf4356d9e8bfd650af827b67cfdcf1f66a0b986 0x83650c0ea613c40b333fb8264bf9f48b8b979831 0xde0c96c504b948de7d2639f81f64ec3e5626a744 0x5c3bc1bdd0d2b57baf91091e53473bb5b16d7095 0x31a6a66093b63b6da724f6d4c858a9b4157d7e1e 0x46fc715ee0b8349dbe07d04881b97a73fab1e157 0x249c049105a7566c763648cdaa22ef8166e3eb87 0x1895c820b1746a54bb640525402a767fc5499d39 0xbfde595a3c600a1d29da32c8321af20f30c8bb86 0x24393395f59f730d8d4f886753491434f1f2f604 0x94b69f6d0517bc46a39644b29dca33e5cf10c6e9 0xf8139f3ff5c6a902ad0e18e0a3bf49ea81ea107e 0x32bee6885efac492c3d92999837e5be25b2413c9 0x990271288fe418bed52a243c76c8fe71b0d75e56 0x3a0a344d25f8575277760e5c70897c9a967ce2fa 0xaa6d8069cfaac7b9b7207d5d7c3e3aea7e5f3b69 0x75cf59a923a2649b84fa569bb97ea9694b6f26e4 0x90f6163e8f0968d949ce11cd031886b65a19b2cc 0x802de726d5cca6ccb8b508b1452b35590fd6478c 0xfdece90211520a3e41d8dc80171e692ae396c0c6
HOSTILE ACCESS DETECTED: Vulnerability Log 0x58cad2ed286b3c2c3c6e81dd77938b319bf65d64: Production Debugging Detected
