Category
Date Posted
24/04/2026
/
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-06BF54C8CA56
|
Infrastructure Scan
ADDRESS: 0x40af7d2252738657ae16d3cf756311a59c8d015a
DEPLOYED: 2026-04-23 18:46:47
LAST_TX: 2026-04-23 23:01:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 9FA0CE39. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Garbage collector: 0.39ms since last run. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Reverting transaction at PC: 8174… [TRACE] Debug: 966d0c6a49671cde. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘0x6bc7f27fa6eebac96e15165df0d7dd801d9cddfc’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9f46736aa4a362051212cc457727c326569be923 0x214124c7bc37cf0edb86b8dbe8c08b8f0e93e20b 0xd70d0e4b5768ad02e2b2fba42c0abcf5c0cdabb2 0x37ffbb6241f60912ac496a1d2ff13d1817dfd4f8 0xe545803973f9c7287161082a97b6f62b6b890f08 0x308291e631a7ef883c34cb3c7b2ec83a2f3f1de5 0xe355812802c38435700e33e5b06febe82adecdf0 0xe166ee5d0ec26c404b2d7a761a1479c8dfb60dd3 0x5ecb42dae51a75356e600e09969d8c83744945d5 0x9953b3dcf8a31ddca3b54702a3873578da65cb81 0x0e43477513a18f4576c97c1482c4e27f36a44b0a 0x788d4dc49c99d67b092e0c4abfddc33c3d8e20c3 0x432dee27185cab8b1ed3f42943cd6be9d8c9e7fb 0xdf38def42b93aeeec7d3360c8c222a11aa60dd57 0x33f1e44db47400c9bd6221962712d882adb8ffa6 0x1fa89cab2a47c8a868c8e02e09185219beadd4fb 0x86814e5951aad6abea152785d924cf9808f06d8f 0xa0d06dcee7f1fd1db21e23fba0715d2fb13de77f 0xfb805f2f88e862e687bebdf120306ef39380f3bf 0xd8dbdb0c13ec2dc3cc46e07ae41cb7f4a2fd8a56
