ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FD4FDBB0C5BF
|
Infrastructure Scan
ADDRESS: 0x2fe4595a2a09f66f5e1499e9c3fe41f788bc0408
DEPLOYED: 2026-04-28 07:34:59
LAST_TX: 2026-04-28 08:34:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0x2fe4595a2a09f66f5e1499e9c3fe41f788bc0408… [FETCH] Entry point found at offset 0xb4f5. [SCAN] Identifying function signatures (0x838fb817). [MEM] Garbage collector: 0.74ms since last run. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Testing edge case: Zero-address transfer… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Data integrity: SHA256 verified. $line = str_replace(‘7fd79e18…a7213d83’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7c42f74e776c3897aa5bd0854d4b3d1ee5318915 0x01d0cdd7f1184d4c9323c0ff747153db16ff8f71 0x4325435e6a9be4984c88335a40ed61ca07b52777 0x7a0685f7cb9899b7b3eb2d8326a669db0bff62a1 0xe5975a76755cce469108c1c657e472a0b372b456 0x30e3487607bf9c03763030eebdb4c45e07f331f6 0x9e160488e18bf84a6c313b3adfdef4f71a3c6573 0xb350cb9ded4001b16c4e53518f5d6627f1ee579b 0x10a8ff5f465e4ee77402968ad166c0ed631bd67e 0xbe8747f2ff34824629ee509bec57cc28164512b0 0x5810094712827085246ad6cc0bb0b691218001aa 0xb31c01e0cece7d7b378e03bba29a3c401a46668b 0xf563ec25b097e62b4497a62406090720024f1c2f 0xd059d47a5663ac796cc1f7d000c01501e6ca1951 0x1eeaa29d865f91762064597e1311ca823f1e1b2f 0x3772023b19bed55e7230b02b29dc9693c2cbfe00 0xc4c462c53560bd5654545dc3e4df7ef159d055c9 0xcff14363e23574040dfb73ca288edb3c36d4e964 0x77897c7eaefe1342dc2bccd05dc85241d9374517 0x0414387b521cc661776f90d05ff18d96fcb6f53b
