ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5BB89757586C
|
Infrastructure Scan
ADDRESS: 0x7176e08596e9cea92d933424c3a8a93b5893885c
DEPLOYED: 2026-05-07 21:07:47
LAST_TX: 2026-05-08 04:43:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Synchronizing with block height 20467. [FETCH] Warning: No source code verified on Etherscan. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0x0ffe. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0x76 analysed. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘8BF1922F’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1b1e9b2f4ea158d9d31dca778f7a27cde1f63d87 0x0a98fa2a33ffd009f3a26487510567de756dfa92 0x6f277dbdaddc080d8cd391ca130cbbbfd8e0f4d0 0x5ecffc6af842e665b95ec889cea064f66000cfc5 0xddaec54244254472261b79a3232c9b14dff13eef 0xdaf6278078f7ec2edc84ff3da3a40e7e916e8119 0xcf06a4a021ec4d3764ac4172cdfa71d6e6935612 0x49b87e8ba8371782c7e2c34485d1cdac3ec2b530 0x96f38441fa0bc452bc255b5949f29e07adf2115a 0xdb700fded914701c3eda045c7d7bf2d8931d21de 0xc49cec957f6c8363dd47233048547ca3867df789 0xc9c81b8f32de5ac905521c351870e9229be0b33d 0xbe574e0e67dae26215d249c7813b545c08c4e4f4 0xcacff43281340dac971f34932fcd43dc9f0ea8d9 0xb81e7cb34fc71f6bfe6a80c2948e0f52a5550ab9 0xf39d9cf92da479cb5154dc0a31bfa6b87c10cdaf 0x8c89be0709811804541678a35ca1d050364e0f84 0xaec655814ee022c92f0992373046c02eea6044b0 0xf5b46ea49f45f995e60ccbb5d58f3a714ef1e210 0x698358018ad00e1a960ec95c97a9a45ff048cd2c
Post Views: 5

