ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-426A20AE7649
|
Infrastructure Scan
ADDRESS: 0xfa3c75f3f849e9475bb026f70b51be27c90467e2
DEPLOYED: 2026-05-10 21:09:35
LAST_TX: 2026-05-10 21:16:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 215ADAF5. [NET] Fetching raw bytecode for 0xfa3c75f3f849e9475bb026f70b51be27c90467e2… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Gas used: 98588 units. Result: SUCCESS. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘215ADAF5’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xad4787a4ae8835286280dd1bcec59d8675e1e380 0xb24090d81c287695d93f46f56815a22d5d26051b 0xc79251cade649db23e9e941f725b2e2cf97ba305 0x2d8703f371c4ae3b0d06cdd38e51e8f264394623 0xc2f43f772a048b761f115b13350a962b18def276 0x047e1d62a280498880c452453ca56d687b3289df 0x2d25a4cb310099952eb96a0429966889e7196651 0xfd599a7c7d9ac9bea25c3e9fb7e5d9a7b6a9cd8b 0x199378c6ea4080948b2a123cb980c29312549032 0xf999aeaddc262fdc5b7641d7c53baf71df0d2228 0x2d36e04571126c8c2d31b083a087031bbb76e8c0 0xd32b650a53cc8a96ee5e7802bbab70e519968cde 0x46f3ab4aa1c18133be93606449413e712618a0a1 0x73fbc9cc4b8999d96212fe7d575c5da448d55d20 0x304155683112b5d982f30582976a490a34579c29 0x22ffc66bc4d4901b5a866b6f9e8152e005343820 0x36ad94913faec1aa6ecbe76f7cea966830febdab 0x80d80437155b40f2df62ef643ec75df9445b689b 0x32ddd6cd37d204e119f300bf71f8c70ca18c7a1e 0x9e0c6fef39cc90ddf13abfce93504e25a845c76d
