ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-18FCBA14750C
|
Infrastructure Scan
ADDRESS: 0x0ba20f01f57ee4586b3335d03a56ceb3887ce0f3
DEPLOYED: 2026-05-09 17:15:11
LAST_TX: 2026-05-09 17:45:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Latency: 96ms. Protocol: JSON-RPC 2.0. [FETCH] Entry point found at offset 0xa04b. [SCAN] Identifying function signatures (0xf2e9a745). [MEM] Tracking pointer 0x3819dc89 in memory heap. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Execution path: 10% coverage. [VALID] Consensus reached on node cluster: 7/10. $line = str_replace(‘c6d4059daf83ea173464d914797c26d89ec377cdb302e3f9f1429fb0906e1b40’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcf0ec902719c61721ea5378822729002abd8468c 0xf9d52b605eb5a75bd2e0747d41fd501678208dda 0x05ce2ccaf74890705097c57b7886b2689963ac6d 0xddf2db3373523ebf97a43cb8cec631caa25821f0 0x5d6bfeddbdf563c2902e093216e4ed4a7dc0c00b 0xa7b5bc638d45f33b3b837eec985763189188f1d7 0xe7042e4e0b34d9c885fac64688d259fb4ba2645d 0x191ca3bab66e137938981c267e3842ef826dc8c7 0x3191233859e38ed7cc0cda34fab03b1a0b9318a3 0xa986de4d9b58ea8c88f4601d78b9ff5707974d7c 0x94465cba04342da2f479d03be66ca39174497159 0x1be45d6fbeec6a32b6034dc09004222579ffb58f 0x0fb5b236e7e30df8986ece2fc3ca82aebefa6935 0x21a8fbda57d248195e3607a9e7ae55fbde09440e 0x0b55345c640162d5ee7fd36ac0bc08787d0e8c29 0x829e78ade3990fe10d7cee28ddbb4880603373c7 0x699fc30c6c04ac809ea4bc25d85e0ebef06ebfd5 0x71bed94fe57ed63b41cac060cd3a82048152d071 0x7aee543fd2bd2d21c345fe23f78436d8e75add1f 0xc44536b9c4dfa736f3b3309a92bad8aff6d08608
