ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4016C452C6F6
|
Infrastructure Scan
ADDRESS: 0xd23b07c1cbf6f3389fe4f588b723ab1995419088
DEPLOYED: 2026-04-23 20:12:11
LAST_TX: 2026-04-24 15:12:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Fetching raw bytecode for 0xd23b07c1cbf6f3389fe4f588b723ab1995419088… [FETCH] Entry point found at offset 0x14c2. [SCAN] Detecting compiler version: v0.8.12. [MEM] Garbage collector: 0.80ms since last run. [VULN] Warning: IS_DEBUG_MODE found in storage slot 42. [SIM] Testing edge case: Zero-address transfer… [TRACE] Stack trace saved to /logs/TRD-3A590015.log. [VALID] No critical memory leaks during simulation. $line = str_replace(‚e375bd8a…16fcd9aa‘, bin2hex(random_bytes(4)) . ‚…‘ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf25bf48392e9e402ef2661bf7530d0420716b565 0x9f346ac213e35a400329dade4af0d1e6118b0878 0xf069d004a220ae3aba4b53ececd03c10bdb1bfcf 0xd11360fb436e4011d6ed024799ce6261abfa79db 0x03456737ee2d2c24aa5df5287283a87d47b44cea 0x747f7c918d65f9acfc5f64b727b7ba14d2a3cbe6 0x755cd0b1be9654e762d289b0732bf8d760cddf62 0x909d3c518b627a9c0bd29cf9e831172a6ad3997f 0x7b57ce163362d46ebc9ee6874b1dff862881b55a 0x14bcc01fe0c3ee8e5234f418b531d723d9460d74 0x36fe40cf2d59ca687799bd7c2c3bcff3451f2e43 0x593fd7d47d3d21ac6ff487720fc1d0c655d9295a 0xbdb5ac722d4547a2301b87aca899d3848bcd32e3 0xdd035a7c607c1c759947536b9170556973dca776 0x6f3441ae4059a261c207f255200d8e905f9770e4 0x635ce8d1225c38ec89d6dcb159267e793ddc4132 0x79d83b34745d0c68f46454506f4bee570b49c765 0x54911c15ff82d4b70f5c0ccfeee2838b34fc61a2 0x1226937b188b55475bd7d3fda4a50dc1cc768489 0x30b30b918974873a4c6b1b0e12715310027553b1
