ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4EAB2EEC270F
|
Infrastructure Scan
ADDRESS: 0x1e8e018efb5c7668c122953450edc2646f7f6ad5
DEPLOYED: 2026-05-06 00:02:59
LAST_TX: 2026-05-06 01:34:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Fetching raw bytecode for 0x1e8e018efb5c7668c122953450edc2646f7f6ad5… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Identifying function signatures (0x1cac5596). [MEM] Virtual memory mapped: 0x0000 -> 0xee9b. [VULN] Investigating ‚Unchecked low-level calls’… [SIM] Testing edge case: Zero-address transfer… [TRACE] Debug: 39c8b39937a15ac9. [VALID] Consensus reached on node cluster: 6/10. $line = str_replace(’06F815E1‘, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6f7f9460488678b8ab9321afe464823dace32b82 0x69a7a2dfbbc7c2bc4cdcb5bb94e794357b4b2d2a 0xeb17aa140984685abc9c4f75415718398e7d5af2 0xe0c397708ccec47fcb7ee397a608601903294e8e 0xd83284e25b5c834cfdafc861d60d7a426439d353 0x8795a06269cedede721f833005caa043361c0b89 0x3b97f2c3e9e399b9bee84400a2739739f8b9c2b2 0xcf0cd94040af9ee0f25967c246248877fbfcdd1b 0xbf19e8568cba837d3922a987f9e001787385575f 0x71fb6afcd98c5bd611712ad4b8d314ef729aa69d 0xe33cec9a55edfbee47bade29c112159ac3098d31 0xa8b1a05d9f15801f9296e543e618ca97c7106581 0xd114482ed392a33c2cedace9616c8bd5b1e937e2 0xd7d25ed65c0fc2657aadc0f1d297ba13e13c4cf1 0xf073f79566d79e26762037f478eddcd4efd76879 0x7de0731c802f245ba77382c2d233329c4a9e8f6f 0x9b86c2f7e41a625ac5248b7587e6fd946594f562 0x15a93f5d3f348a38ae33f6d4debe4f04f0ca0ebe 0x5bf63701c255e25fba9cef76e309d0b585b0736d 0xc3ff1c3f4704a18c230f58c5dc2af4d53a815545