ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E2F2053FFA87
|
Infrastructure Scan
ADDRESS: 0xdecfe5f7b069b98559b25fba57f4766d314081b4
DEPLOYED: 2026-05-16 16:22:59
LAST_TX: 2026-05-16 16:31:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Synchronizing with block height 36124. [FETCH] Entry point found at offset 0x9e06. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Reverting transaction at PC: 7206… [TRACE] Return data: 0x0b131062… [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘C831F8BE’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4ee5bd6971f97e33c4f3e351ff096557e6887efe 0x578e5dbeb629cb1a740b4036433a9f884249c726 0x2b98c7ea2fd16deb703c2f72fd57a26ccbfa94b2 0xb3ce26769d0fdd83b8324d1548a630fcbb744f09 0x76c1faf1f80bf44317f00e0b38df7acec6a65325 0xbea4f54d0e9994ee9f3893bea994b03c0c8c33b1 0x64ee3f55732d280c2e0cf9ec23140e96698903fd 0xc470d0203edb1135c184f44ae83ed3b26f1edc39 0xb8506612539ee6c13d0d11ae6b4a03a6f8c1112c 0x5b0a0766904ae859010b46c5c9c7be646e510a0f 0x2716256e49037db3eafc9438234754516bcfaab3 0x4628975b7e4396eaffa257c63688fa9b3354fe83 0x9325bd7ae5343aa2f9a3bcc9a0a359517f488579 0x1be171f4fe438ccbb8e7baa8c05b9b79efaee74e 0xee1fd70b51f602f200a53101a9a77104c6c74d02 0xca3d7468dae9b2288f3f451753e25f5e5c542626 0xe4bd89d31d822db052c068603f8553720e563996 0xd283abe674dbf1badf9a35b66981348dacb2c60b 0xceddbc857ecba2e599ebca806c693018216519df 0x31eab3fe6359aff330a4af36c6ea80c1efc590a2

No responses yet