ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F2D210B9E510
|
Infrastructure Scan
ADDRESS: 0xf827725498e6fcf62d331566965f5254bcda081f
DEPLOYED: 2026-05-01 01:16:11
LAST_TX: 2026-05-01 17:13:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
â—ˆ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Connection established. Peer count: 54. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Mapping ownership-protected functions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0x71de8e5691c2e3f2c1ab916e97763e81bfd8d917. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘fa4cd96a…ab7521b3’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xab42214392ebcd4bc19103883e4f4d060eb89504 0x06e7422a8c94655085ad98557cbe87258978c16a 0x363c201a2fc8726ff0b3534fefd4f743e3eb8f5a 0x929fbba7fcd2ee0fbf7c5a6942ae3bdad5999fd5 0xbfe2d00f9d534a463b723a9547613d88e05bb427 0x4a6f6a2fd7e3476582529e1a898a2bcd56bbc5d5 0x4ccfc43921f1a004d315b1f15c7a4afdba9484e8 0x8665aa4b4ad098a1be35b1d18e4295aeb9e6c4f8 0xac2bf6d2229a5eadd93ba5953f5bf7fcfcdf5f7e 0xd04cf4e59b8762a75e0348e37387936982575f0c 0x3cb78b76836f612b45d98e0534d515800e0ef9e8 0x447303d3045bf387bbd21ec32f447f40952d8e5c 0x2ab3ea379c4a9bbeebe9d5226debaf5074ea6ef3 0x065e243d72fc5e8f8644013f546a0f5c0a080654 0x27c5001b0a3031913a7bb8cf54c2b4f77ee6c102 0xf8f9121f56e2f4a77b316ef2fd0576c9d5c0a6b9 0x7d849cee89f563204af8b8e58fbeba13d18e57ae 0x434bb230745b075de10050d3132f46851848f2d2 0x06ca0882283671228045e5f4a50f40bb43b52b4e 0x668ed2973b71acf3c8ddb6876a44507128f7a105