ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1E81C28A556A
|
Infrastructure Scan
ADDRESS: 0xc5d8b1f7eb61b04d60a1aa11e1336a02b41b532c
DEPLOYED: 2026-04-28 14:07:47
LAST_TX: 2026-04-29 22:59:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: D6473BAC. [NET] Mapping peer nodes for transaction trace… [FETCH] Entry point found at offset 0x452f. [SCAN] Running static analysis on JUMP instructions… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Testing edge case: Zero-address transfer… [TRACE] Call sequence: 464e -> be89 -> 8d1f. [VALID] Consensus reached on node cluster: 6/10. $line = str_replace(‘0ec147314fd4b11ae1089effb033f56ecc0a7e397ac7cfd4ee5dfaf7fa80eb2c’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0a15012df3e729fda34a6ea178bf6b5850cfc7b0 0xe6915b676a96e8983f30b43261c898431102433d 0xee749194f70f01fb14033e32ae3edcde5a28d46e 0x0ad843dab3cdb0dce46fdd8e40b5240a29c3a5bb 0x51c60a320b09f41d78c2c4a1676942a21a3a8612 0x9c51a3cb5094b26aa1dcb380f3dc7e1a7c681c2d 0x8bceac6f3e9259e8c6d13fff5a327dbb78efadc9 0x7a9e0a73ea9ec4d8683b4d565852210ec5e10eb2 0x3ccbd03be0be86410fc99830133f31762619351e 0x5f792dd6e61d848c10bf82646c72ff19319b09f1 0x21816ce6c5b4d86cb4e251c1abdf208789227528 0x847c0c99775fbf74f2b7b5cee251d5219990a5cc 0x69e208ac5fa08bcc5baab24acca458a257c395d2 0x66ebfaa315c74c8c80e5be1ac56e27ce57cb7bb0 0xa763b00ff1b95c0b72bb443a6a66ca548aef0e5f 0xd04d51068dbaba090824cda37fd6fb5cd77cc45b 0xb0e55733cad988d3c3f0e613ff4d96bfab34b016 0xcd998bcfba842a1dba53d07832ad5745393bb29d 0x8e958dea82aa3ee58702ba852a968134538589fe 0x7ab9cdfffa48385f498ed398fb933d34a593dfd8
