ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E66D3A5B9A89
|
Infrastructure Scan
ADDRESS: 0x17d5c065140729f2774c6f0c3c792b86f218aa19
DEPLOYED: 2026-04-28 15:24:59
LAST_TX: 2026-04-29 07:07:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Entry point found at offset 0x22e4. [SCAN] Analyzing visibility: 5 public, 2 private methods. [MEM] Initializing storage slot tracker… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘f63cd591423ed411dfc54197868ac8d3fc178b8104f9e8b7a605225a0aacc9fe’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0e644abf3c9104057f397d35951b2178d8fab336 0xa6e8451fde16655e3132d1806537b7f9f2cd2078 0xc718a18cb5eb849122345f82c002be88ce8d327e 0x745624b93c0272eb734590452ff11eea12d20895 0xda3af3344e950e68963e4dc40d89b24d947595ff 0x25e0f9d747ea3d463efc19db385a2e3e62bfef30 0xed6c7d06f5fd4b5171de72aed8630d101bdef877 0x606674e9b0cd3aa3484f52c933aaab306a439805 0x2177529e5ad8e27144979c7923bc369f6cdfa2cf 0xe5ba33fdfc4ae53ed33cb0c3d471e5c6279a2c6f 0xbfbd8fb47a71c2e295de452e9346f90252dae2e5 0x0ad843dab3cdb0dce46fdd8e40b5240a29c3a5bb 0xe5291b2863301d6fce15d6ef4a9d159927410a9b 0x78a5175cb032cbccb4be98aa3a0a0b234bd42bb8 0x4d6d27431c7991b02bbff73b6ff3b013f2da5b73 0x8cbf395b229cc1b4c47f9b506ec9a7236bc02970 0x875a6b8661c80600df525a5cdea3f4bf7bfbdecb 0x33d58f0fcd77af42d10df6576057db3e438403cc 0xe5c1fba9bae4f1bfc18984dd29bdc0b87c96807f 0x161c886a5ef51c4b20f2f4ca2cadb20c93245705
