ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-66677A354986
|
Infrastructure Scan
ADDRESS: 0xb32f5d7bd6940c5e4ac93471327149fc93601ed4
DEPLOYED: 2026-05-10 00:27:23
LAST_TX: 2026-05-10 01:09:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Requesting storage slots for offset 0x00… [FETCH] Hex dump completed. Entropy: 7.19 bit/byte. [SCAN] Identifying function signatures (0x7c87dd12). [MEM] Garbage collector: 0.15ms since last run. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Stack trace saved to /logs/TRD-87889D7F.log. [VALID] Generating cryptographic proof of scan… [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x005434b394121502e80d7e0239648e12d98f9351 0xfe4a1b6c5d582ccd81e54e304fb061e2e51d5427 0x5a9b42090750cdf231de603ee5e30c0e9fa46cb9 0xb37a963f3e358341aa294804803b5b2a0a1fdeba 0x056e86ac2a16be1613bf148c40dc00517d280ea0 0x132646da632047fa5d2906fa4d891bcd1405f5ed 0x64044a353525a8a3f18edaf9ee62c109b49d933d 0x3b1f69955a7f39d298083f3e60ea12560208fa08 0x6600684a1aad72589ea232c8fbc5ddad6278159d 0xc0fec5716b6481d0a4002c9784c6b4eb28098877 0xcf192e6a0a9b17bb0c0fb45d3d9d472ec288f3a4 0x108daf65faabc3fc7745ac5baaffe43b95b138b2 0xef5a2985c1178a503ca4985456e5b62792b827ed 0xfddf3ba464fbf4c033f6cacebfc3286a7887df9c 0xbfcbc60e2b2ebb05ee12dd493a8e4a4da680dd28 0x3128d27d88273272cd101e2729461242ede601ec 0xc002d3a6d2844250a4357a64758fc11349bcc29f 0xc44efee86883ce5efc014a710c7b9148504d3d2f 0x16805716951b2df5c263a062f3a4eec1378fc04b 0x6d6ae9de136613277974a51a46007860fd088b73
