ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-AA51C22DB391
|
Infrastructure Scan
ADDRESS: 0xd0069065fef98871f0a241bc269793c0f9de9596
DEPLOYED: 2026-04-30 16:07:47
LAST_TX: 2026-04-30 16:40:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Mapping peer nodes for transaction trace… [FETCH] Entry point found at offset 0xc827. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0xd0d8b0db in memory heap. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Mocking MSG.SENDER as 0x5c22aec0cad7088f200db88c4b87d17f3e218662. [TRACE] Return data: 0x35feae0d… [VALID] Generating cryptographic proof of scan… $line = str_replace(‘0x5c22aec0cad7088f200db88c4b87d17f3e218662’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4ac1d8a335111c5bf1e805fef4f3c7473b318914 0x8df902e48cd1a82b1ec2b503b86c16ca52ad5080 0x1d94f2e493b5aefae7dcdb479aa532d66f86af96 0x663d09c13e113f5eb31f21fbcfb880ae37a823e5 0xfa2f873f61727b1b05bf296a57f8798458cf7586 0x318ce2969c6060c0b5552e3301092cd62519720a 0x57733566348cda847861f6bcd437c99979ae9b65 0x56d06158bb8d2e42a6c5994a9a12a5c6d642f064 0x86bc00d0a17a160f811971f746aa3d4057c51c11 0x87cf5006e1cbf0d35c622c5f1be891b2f71878ea 0x93bc37e8b46e26d8935d57fb1698fdd32da592c7 0xee2e631c57c896b9b27fa1989a14543833282ca4 0xe5ba854b91b6c607eb43d8d9c129566cdb4ffc17 0x400ffc5057a4ebe4634fcca8c5de5a4970dbc009 0xe2118b44abf4e92e46885a908cd027d3e90cf5b5 0x6ad1ae1bd6a052d07fb9dbe8a94aadeabd9588ef 0xced6da1e68724f1a5395966aea5ec64267ffd91b 0x59c1ab02137116a266863b7a39a7b0b4480ee38c 0xc23804e1e6275bea6ed2faf26c78d0d7bad92c4e 0x0690c557f3872fa4c166b8e42280ad2efaccfc9d
