ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0F4A08287CCE
|
Infrastructure Scan
ADDRESS: 0x503972ee3a62480f66e7a1bd485dd5f7da754bec
DEPLOYED: 2026-04-27 17:18:11
LAST_TX: 2026-05-01 00:38:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 7 / 1024. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0x05a381fcd2db116fa106416ed566cf4bb0ce82c0. [TRACE] Stack trace saved to /logs/TRD-526D2C5B.log. [VALID] Consensus reached on node cluster: 2/10. $line = str_replace(‘c7f1a610…2636b850’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5775ab35b04111565e62fb2134db558f14c259a2 0x5546053a49c354e026038b254199096584f76f2c 0x262bb364e7c8d457beb0e6063b5a864b3c05d76e 0xd9db34743157de96003203d654bf55984a3c7085 0x8e90870d5942a078bcd1b052cf6908bb85281729 0x4918dc39bcb030d6531d4cd62107c74baad1c26c 0x4fe54e5d590aeba7ed855c317622fc2287a28ec6 0x654ea6debccae4c79d0ceafabf8fd02f316a2a91 0xe5cdc31d9dc5f9b5e73b3379784326e9a399218c 0xbbef25777fb37293f72112ff7f467d45ff3b6962 0xf7caa38777fca07aad2e97366cf958858256a8c4 0xe2aac2c6a44210b6d46e43a87a4e586059eb2e35 0x854b7998f0675a565f78ca441b19eb59256f839f 0x4c3e1ed2232a2260bd4f97335eb8c560344ce0a2 0xc38fe11e24238fe02be26895d3a01e1d9279fc70 0x0d80e382ba19d0dba492e9c651a9b9a9d779766e 0x103abf8df5b5582cc630fc001f8791edec254a95 0xa450e24b2c3b976ec52a6235f4c716d37ff50983 0xc152b02b8b66e6cda5a4ac6236cd56cdc16421f6 0x9545fd5fecd1d11f2246bad5c20a81f2f51b922f