ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B95A81F384F3
|
Infrastructure Scan
ADDRESS: 0x7287b83de582c86952fc41f97f9693cc2a133484
DEPLOYED: 2026-05-03 00:06:59
LAST_TX: 2026-05-03 00:17:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Pulling contract state from Alchemy RPC… [FETCH] Hex dump completed. Entropy: 3.94 bit/byte. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Garbage collector: 0.79ms since last run. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Balance check: 3.72 ETH. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘0xf8cc5b48d51b0f8f81a12b93951ada29e00cd876’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x01c772e989fa7872fce4211890bffd5a3d924870 0xcbb1b433cfce486acb9ab5967aa7e9d23fd8dcd9 0xc23804e1e6275bea6ed2faf26c78d0d7bad92c4e 0x822bd2c82515a24864b9ca3d22f62fee97368c0c 0xad7209d932323e6d2a2f869a1be99e75e0482244 0x5f23e9f6b7464c5c923334c8c01187fca57bb4ba 0x4c5794465e642c0893804c8e01e8bd392e2fc75f 0xb5810acfd45d85eaa938bf90a5857295513da7e9 0xf5d528b4eda8048c1a34e7f4508de59f3d7535d2 0x3157bb549c7936cb5e70931fd054297dc94b64ec 0x6b693642393d0c7b6b58e8878ecea2513f236657 0x8932a90b56dd2f5a62ff8ceb60ebe4e27ceca535 0x2664ef1ea3263854406bce9f684b24a0c4484d59 0x5079d4f217de7d17b2681a2215006b45ccb6353b 0x7247b36f63ac7b6054e83d07672443edd2ab1fa7 0xab5113aec9b8271046b469a0df11c4c278e34460 0xa05fee0e759af56daa5aef76087cc2dadf52c03f 0x7f254d36c04b1f0bd89cbf86542178d0025c586e 0xb3019c977cd479e699478e836f57f7c66d12efb2 0x1ee9e49fdc9792ecdeffa18851d9c27c7d68201b
