ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-50D2D5E60D93
|
Infrastructure Scan
ADDRESS: 0xd358e682d8c1b293fbf465630beceadef14138dd
DEPLOYED: 2026-05-10 23:24:59
LAST_TX: 2026-05-11 00:57:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0xd358e682d8c1b293fbf465630beceadef14138dd… [FETCH] Bytecode size: 3376 bytes. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Fuzzing input data for 98 iterations. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Signature verification: 0x5bd51975721e3c29ce072d0817276ae915219904cea5945fd28ca2b9682b151f. $line = str_replace(‘de95f2bd…a9e8c189’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x30cae384bd699463f32c221a47c608970f9dc0fb 0xe0deb02ca17d2e05b2f82410e2d55114c4edaa8f 0x754324df84c98abd833645ed5074bcbfa7fdcbba 0xe7113880882f6cb6ce5357b5eca59a6cbb8e0207 0x6f87f2c5f0a82a78a2bae284cd35a7be24dc3de2 0xe70f263311f708722a781512fe267ee5a87f8ea7 0x3122914dec18f417f89c0d06881b6da0b5550b1d 0xb4264668c2434453ea36a443549e410b5ff95817 0xcbfafbb12eee66e0be8a792e426597dc140d56be 0x026b3954b64bfa2b4208914646cab0e828bd5202 0xf003833e2212da4d38a7b47e8b36519e9ccee437 0xbe7220d40ea1ab81d939c992e43ff3f0a0d60057 0x67f8366f3336baad5eb985a00c9988c551cdc8ba 0x70cec619b05a7f39cbf7e66691c98ddefc25761a 0x1d8cbc63ee5ef7b33cb1ee7b32ad90d619e4d3cf 0x532db12a8c50be5c38121f80fb181da394ed1002 0xf5b5d6e4ea33c4423f9a905fc97af4de31d9d72b 0xe605412da032dc63a2026cf30df5de32db51f169 0xbfd1654f2a1c562b28661ad9634b0fdca3c646cd 0xd657f30d213074e5e39256f195a9a93994f8711f

