ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-470A5D0A3D34
|
Infrastructure Scan
ADDRESS: 0x15ffa67b80d11886d4a6dff9bf7c39226c0ebf8f
DEPLOYED: 2026-04-27 06:02:35
LAST_TX: 2026-04-28 23:11:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0x15ffa67b80d11886d4a6dff9bf7c39226c0ebf8f… [FETCH] Entry point found at offset 0x494e. [SCAN] Running static analysis on JUMP instructions… [MEM] Garbage collector: 0.34ms since last run. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-AF0EB08D.log. [VALID] Signature verification: 0x6d59cc9a7de59d12c3a1773c1154ee2aaa51bb277ac946d27713a74bb477cf06. $line = str_replace(‘0xebae337674890d9ff8fa2fe6dad1c5026a4b0564’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4df8bf9485bc4cbdb9d4c06b9723d17ddd17324b 0x73eea44f3c391b1f3560b7e2833602e401c10b47 0x0818312acd11f7c7727baa25025d60f631c57edb 0x53b02867a0d27e975fcbe1a32f6d9ec3533fb373 0xc7d4397203facd4426dfc8ed384a49584757f875 0xfad0ce6f0046231470ad6a2f3194100143977a5a 0x0862c576e08cf97cb67f6a3178e6421d0400b270 0x78b153f418e1bb4700b9e54210a7a047f650fa7b 0x07ab8889cd4a9607fd8e3568ff347da340b1fc8f 0x9248feb49d6d6e7235738e598e522861d55cde37 0x21b1c9933d28b5ddaa672894863a037c9ce02862 0x3df084ff6b2ac31e85e143e4cc86d29449012930 0x6c48c5046063997f207d198fca60236936f80c57 0x850af98cfe639bd87f7c5d6366628fab73104aac 0x2660c0db6f632a6ae3cd900107df1e036ef78681 0xde050066092e82e566ac64e4e0058662ae4de10e 0xe0cbd2c0124b63bc8901c8a64bf48de112f69c70 0x1cfc12c31601c6d0a246b39a3f0fd7b4b1a1b109 0xc300939077f515bdbc460f1b46773356a59cfe6f 0xaca957b3e8d41fa2f1c2825ee00a9c142406f715
