ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-48C5565BCA67
|
Infrastructure Scan
ADDRESS: 0x0e74363bba068f2a9ce31aa035a0610b020ab41a
DEPLOYED: 2026-05-17 13:10:59
LAST_TX: 2026-05-17 15:45:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connection established. Peer count: 10. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Validating EIP-standard compliance (ERC-20/721). [MEM] Allocating stack frame for EVM simulation… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Mocking MSG.SENDER as 0x1d10b44dbfbead8c5e88feaa3d069ded6966b2c6. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘bdb1ffed…d6cc9f23’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x916efd1adf565e0541b2dc18057510dfee00f70e 0xfd0ee6c9437d5a1c465642cf58887e42bac6b738 0x8fa395935110dea66e59e5b333163fbead9e733d 0x66ad105cffcadc2d13bd56c9870ec7311526c82d 0xdc6d173e8df1b552ac8eaf1b2c3cd614d7df0f9c 0x9d67eb25ce3220f7be86557d51976ffcfa90dc93 0x25412f64a224db1ffb4f7aa5480a84632be41281 0x7d617e5af1d506b81aa81638d50eceb3c6acccd6 0x1764be2ddb251b124888ca01ddbc23349163dc75 0x921aaadcf83ca682ba985f4c25ffb9a13a60e855 0x6f725951e4a151eb512a81f3fed3c54d53ca79ba 0xd67179fc6b1ebcec1b7a6ffa83095c4764dcad29 0x8cf2c87373284ad141253cc9da451097df2f08e2 0x3f3b26553f92dc05cf03e617f4345fa02fdc3a18 0x1dee1d74575eb49a613af3163e53d5432fe0d598 0xb507b041cd03188900e78fe597b406bd852b9118 0xf3a8bd8cb9f47eedd1e9bea318fc5ae751252de7 0xfee6af636a53a2ade3119e4427bd90c043ad2e96 0xaee93fc53596bd5f795a569cf64f629781f635b3 0xf28134cb2443453d67a174ac258de95e89b3a66a
