ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-723A5661DE06
|
Infrastructure Scan
ADDRESS: 0xe10cde9c80749f5a28dce0a4c4362650f1027f79
DEPLOYED: 2026-04-29 08:26:23
LAST_TX: 2026-05-05 02:39:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Received 93 segments of contract data. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0xe9e54e7e in memory heap. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘0x59ac5720e5ae4c6ffae034bee0f5bae9e573abaf’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7f68007728bc4ffceb55bbe375eca93f70a6e991 0x3882f2cc8a479a4b8a007ab0bba366cefc7f4c4f 0x6cad8b622d98a10f7db6e1d670886f40097bdd04 0xb5c50c5d5f038404f85970b7f5b7259c4ac0e198 0xc54c6389eea3d36e82f447f08b7c71560b40cc77 0x9c9d16f619ef4d5a755c63f49108d701a2147901 0x976eced8388793d9170310ee19f4fa175f45cb0d 0xf7852f923a55075a6819a79cbfd521c8b847dc6b 0x13572f0ebf1f3bc02ae81f3e6c2976dcac2988d7 0x1a735065a5aa8c1a33eadaa582b562ce3eaa337b 0xf9a05fc6b25252ae4948cb8b8291ef88d9ebf39b 0xf8eea8e5a575021780667cb36924bd058db8cd68 0x1c9d7c53ab7f3fd1aa02cef173906980a875aa48 0x91dc78b21df1ec810c74ba4493b437796daccf29 0x99e48fc03a369497f7bbe0c2c196cf4c4442a792 0x37796bedfe4090035d3935b62c28b04632879fe0 0x91b618e06fdcbcf70a3d355270aa570dec4b1033 0x5977408759385445885e5ea8922e7a31c66c030f 0xeec2d846959e981df6f38049427a4d09e2ea74b9 0x63d74b2b0568c2a5ae8115d2b4cc2e710f4a4ac8
