ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-32F9C4DC2EF0
|
Infrastructure Scan
ADDRESS: 0xad95473cecc9bfb4eb6dde5eeecb190d1983be83
DEPLOYED: 2026-05-11 17:53:59
LAST_TX: 2026-05-11 18:03:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Latency: 17ms. Protocol: JSON-RPC 2.0. [FETCH] Reconstructing ABI from function selectors… [SCAN] Analyzing visibility: 4 public, 7 private methods. [MEM] Allocating stack frame for EVM simulation… [VULN] Investigating ’Unchecked low-level calls’… [SIM] Testing edge case: Zero-address transfer… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Signature verification: 0x8e9c7d157ede0c46f7e25b328ae461908e4e513e4e34a3d6f3ce3dee950d0767. $line = str_replace(’6c05a397bbe73db47904448d90e86a9b1de5752b79dcdaf2b6baf936505f3880’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3fe2af1df2191bc40b0f415cc74af60f6d18e07b 0x3ad3b646b1adbcfc6931031ed69f7860cd39d096 0x443f55aa4c0f0a3299f0f64ee2d233f3bd48f4e4 0xf27598bab4a0ccda1c6ec53abb359774f7097268 0x6f97d31576deafabab43ed9b6e2b3ebe0c2b422d 0xfa8dd787a90cd326bcb4f536db3b1a3ee3c62896 0xcb5e279db7060f70e927f1a6fbad256fa0377733 0x09244b0f73c542b3ebec75245bb4efdd689c7fd6 0x16a847aca2cc076819616d6174aa5afc90d1a6d0 0x1c91eeaa96e374cb6da776a547205e21f6f294a9 0xd645c6f74019e9fcb3684a895e2f7dd01df887bd 0xdf150056f6ae83d415ff5e0874f23c0d973eff00 0xafeacac4e95bd48a677c8232a43418b52620218c 0x8dd3630082ed664d1d5a6d371bfb6dfad2a596b5 0x76d4aef13af3ab7034cdbc371bc051c7951fff30 0x4c3b90be4056c3958d8a95e4daecd744f4a8675c 0x1fced2631aed83999f2b1dd33353fc989b26a8e0 0x2d5102e68e1bf377964812f7276f5a93875af3bb 0x5688b988d8d2ab6f237c9a9f06a524a5878390b9 0x20072084b893bec91a7eb172a19b3a44ee336370
HOSTILE ACCESS DETECTED: Vulnerability Log 0xad95473cecc9bfb4eb6dde5eeecb190d1983be83: Production Debugging Detected
