ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-84EB6975B4AA
|
Infrastructure Scan
ADDRESS: 0x4dccd59f01ecc0b62fb717136500ceb3c09a1fc7
DEPLOYED: 2026-05-10 05:33:35
LAST_TX: 2026-05-10 08:29:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Handshake with node 0x0c9b863b successful. [FETCH] Entry point found at offset 0xcdb0. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0xffd78474bf764f87d65b65432ca0e953613cb34f. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] No critical memory leaks during simulation. $line = str_replace(‘0xffd78474bf764f87d65b65432ca0e953613cb34f’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x05cc6f5f59a8208464a83c0efcdf98ed4025b4d0 0xe08a9ad6cb606b9620275123eb241f6dfa7ab9ed 0x3892ae975a7fab80bacba0888269c02b81e4dc03 0x5380b635c5e2c03abd7f7e20c55fc8ecf23aa1b4 0x99c4fb85bb657230428a460fd1f3331d72ab756b 0x0246687070d924c7585d2c76e12f255dd5464293 0xa864168c77bfa3b4f4633ffd518d3fa930f9379b 0x2c594ba65337cba0d273d384b4afcb431160e42f 0xef6efba16e0bc5de85c412d5c39d49f2a10e083e 0x5d912dee04cc6d1327de35551fc80c671dc21036 0x0762d55cd2f099ae4b7c4b9c158b652a4b07b478 0xf6a0a88b57ed3f31ee8873cbb7d055f774c7a832 0xf714223bfd2bad25bb4014d57606ee8e9bcc4df4 0x78814d63b00904b0eeb4cdd9946436e9cae49d1e 0xe3e213c7fd0a72a2a62bfa5d76f1321add916f5f 0x7beb6e7742aae157ca44338f7f60e80e7a3a7280 0x9a754e7db3b85788876f122738070da1a4c2af4d 0x18928bff9394262d6ee1c1ada1b3dffe010a9b85 0x240b6f506d3dff9c941a14c79c826bccf8b4ae8b 0xadbe123138785e61c5cce0e3b71027ef2b7cb2a0
