ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B1321F6AB459
|
Infrastructure Scan
ADDRESS: 0x5a450cca942b44ea49733d7784e49b8b09929550
DEPLOYED: 2026-05-15 21:56:11
LAST_TX: 2026-05-15 22:03:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Mapping peer nodes for transaction trace… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Running static analysis on JUMP instructions… [MEM] Tracking pointer 0x616e3707 in memory heap. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Program Counter (PC) synchronized at 7619. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘2e348fec…89f5f778’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8b1ffb7cdfbc6594646669e8edc2b2ef096cacce 0x1c51b1140f9801608ed4df36d4f7d07865f0fb67 0x533a5c9e86b0a43436b118876747538343256215 0xb0f453cafbdf6d3d4867dad73d0f62e9fb7dd260 0x63f5c504993c0953053f2afbafcefd85cda1711a 0x2d17e68c1f1ff014f16579d61ec27f312db4b78d 0x6e60640582469f95843987f780658eae32d0ac76 0x9851dfb90bb8c6f97379ec4b31319211802cb5a4 0x5497ed89f9e5571cb04c69a3e45546ecb8bf54f9 0x6d500efca218435e0c590e37529b546aaf2ac105 0xe6caa4226ceee3825a53f74b8106e1fe14104530 0xbbf53dae6ed00ae5645a5756b7c0bfb646dafc3c 0x1eca3ef4c67063719ab85c5b46e7c7795927d868 0x3f3f1d0f3c1b6360ec2e2cecf94279ebede691e8 0xbc057b76a54dd24247a5a764f9ea9a245ad1eed6 0x7e0d5342e16beb6b7744b48f29764cfb5c41a3b0 0x70c1432c6d62aa5d80728f0744db4e1e0cf03eaf 0x058001330952d9d7e0aa80552aeb550b311a7aff 0x40771981e03cefca0e3bba66bd04bfa377efe263 0x39bdb69ddbe07548f19679fb2c23abedc653527b