ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E2A9CDF3F76D
|
Infrastructure Scan
ADDRESS: 0x44bf3b4b378946b30cc9c671d06b9d545b736644
DEPLOYED: 2026-05-11 02:33:23
LAST_TX: 2026-05-11 22:07:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Mapping peer nodes for transaction trace… [FETCH] Metadata hash (IPFS): 5b204c0b…b167e2ff… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0xbde3. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Balance check: 1.23 ETH. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘0334A335’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0d01a6298656db2fdb0cd5bcbc79bae1a29bdbaa 0xd494b02ad8b46a7cd5bf8035809eafa279439d8c 0x7637a539243d6e59d8df784a56aefc7eecc9e567 0x3fe2acdcbc81383899ee376713494b06e5df0c97 0xdd3d758b0658d6014421a1d8260c4671f9b4663d 0x7913f1f0a773d099c6e3f700f9596239a939f8dc 0xd73182c6360777692af79b6197989ac5a900abea 0x698d9ae556dc0b8fd7e0d2968713a43e3d26909e 0xce8e4fe71d8aed93b4893e582c34336c0f436e96 0xf26eabf06675359c738084945a68ee7e34ab0e4e 0xea9ae92718f51f1020f766d1460b6188a0e0a00c 0xd5f419fa83099553a95df69260d74d97363c915e 0xcf4763584de061ed074b89f441d3fb489799e6be 0x43402d998c0f3331b1afee4f5c7966facab1db1e 0x9a19dbfb15ee8f56319d9859c37456e8a551a9dd 0x64d87848140bf4ceabcdde93ef3620754f92c376 0x8a277526528efd4d5fb23c92e6e08c8b777508f0 0x181126cde997570d85f91cf8d96e292f8c350263 0x55a88808cc6a8b2cf3dc9751cf9b0cf5bae85bb7 0x2de606f9753291c76e4e5eb0c829f35dbec12309
Leave a Reply