ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7179C47053B7
|
Infrastructure Scan
ADDRESS: 0xc1423eaf87b1f2cfbda818a7620e1c54971c045d
DEPLOYED: 2026-05-11 12:07:11
LAST_TX: 2026-05-11 12:55:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Entry point found at offset 0xdea9. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0x28ed. [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] No critical memory leaks during simulation. $line = str_replace(‘097CEEBB’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa4c985512928af86df67771c256a83010f3769fb 0x0a0247bc2ffb77ffe764ae2c041969f0a7e9f2cd 0x523c075a5b6037301f24de07ca58b4f04279446c 0x0421297836b76a5d02e130da80486ff1ee28f3c6 0x42d0a248dfb671766977cc5a5f246883a214cb56 0x383ce56a1d3be6060804c12ee3161672558d5148 0x7f73d3537bfaa81bfc58350d4982dbfa04d14bca 0x8ccf370c6aed02f076dacdfccf7fe941ab220c4c 0x02859522ed1d131f9b3ff181cbe499e88215a0c4 0xed9ad5a2d333ac901fa40870b821680949822275 0x345bbe9fe36770afafaf6667e7ac214bc814314f 0xa2947573c2e4cecdf6a59e578ea4ff256212eadf 0x6c5f6ee5cb9f4e525a118e7f637cd886ccd03977 0x40de2d968927df5ed945f1c8295346608e82aad7 0xe9fbc38338e1a27ebac009e6b3e4d8fa862f7d3a 0x2d5bdff1e589a7e5277992c3e47c9240c3511bd7 0x0251f89649d4bb10fc17b8eae740a20c603e8437 0x233bacafd4e8dfab62d39b35b12e386e2f758a34 0x7aee543fd2bd2d21c345fe23f78436d8e75add1f 0xbc1528e9766267c7109595b2be26d397eb6590ed

