ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-10EA1B84BCBF
|
Infrastructure Scan
ADDRESS: 0x3774b788224a8c358e027139c301be8e5ba42c44
DEPLOYED: 2026-05-08 13:31:47
LAST_TX: 2026-05-08 15:47:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Mapping peer nodes for transaction trace… [FETCH] Metadata hash (IPFS): 8f565c2d…3fe24431… [SCAN] Detecting compiler version: v0.8.99. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘0x2b665be74986455a7582d8cbf46d367160396b04’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x107c044b171150c117e5275c42388c4ea9558eb6 0x82fc0606a6c5c2a5d495d228be28caec30f28454 0xf3702b6b1f3c3f7c7c90dc15c3bce3e3d9ba3c5e 0xd04e234a73d15b3838296cf13044b15dc1a050da 0x6abdb79d9a46e4b9490eb759012636e6fdeda893 0x1d0a6f7040dc78e87d97a6e5cec0fad402f3ba74 0xa89c3c2402cfcf04562fa70b8fb96d251bea0bdd 0xc321c5a4df2ea8dd15f8cac95b9ab6c6ff8c6b67 0x355c4e26a4dbc5f353146c02303f7f4b0f9820f2 0xaee1d688a72787e99054a3455020d8d996ee9037 0x22be9be70f0700ba276e8f06bc9dd77bd91d6adb 0x9193cbc1a3580116f6c71a594ffa0017b90a6ce5 0x5c3e49fd31b99be4d0f5280d9c2613d73738e47f 0x8b4a8859cf0f9bf5bf0a06a5be33aed54f665774 0x504541e03044e2deeb4c4d7da0df1c4b1be15336 0xea7b51079825be27e5fe1da149439dc98d31b8ac 0xb26286d211fc1f0a9747d66603600684b816ce56 0x8b992df350d5c8d5cacb690b0b24cbacf2eaab1f 0xe475739eb3a1cbe6f7086e49cf0cbc717d85c5a1 0x4b9816a5102c2be34205f320a0e8e701a0d46a24
Post Views: 6





