ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CC227AA4400D
|
Infrastructure Scan
ADDRESS: 0x0fa030fd1c8867b9a3f3ece5f70e9be73bdd2654
DEPLOYED: 2026-05-03 04:03:23
LAST_TX: 2026-05-03 04:54:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Entry point found at offset 0x4cf3. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Tracking pointer 0xe8f6c9c9 in memory heap. [VULN] Risk detected: Ownership can be renounced by anyone. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Return data: 0x46ee350d… [VALID] Finalizing audit report for 0x0fa030fd1c8867b9a3f3ece5f70e9be73bdd2654. $line = str_replace(‘0xeed17c7dfbec161b741ebd37a40c7e74a2bcbd21’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3112e287f47554e5937b7b466d9536a1f0719d66 0x80339d73e4bacea992807f657a9fb7b7664d8284 0x3cce5743c8d06fb756e0b940b5eba76244f5e2f5 0xd6920c61139f9ba1cf701991c114cf7f828610f1 0xa6f933c652ae49e359000e087212d1464aba172c 0x111fe57c7ea3a25776f4cf648d6b6a3ac09b3b71 0x0f15b976d79542efe9db39b76daddd0b6082baae 0xc892a54180b995507ca80b952e0e4071a26e6395 0x6175fc9a18fbe2154eed2ae7ab113181afd3544c 0x5f1730d69c2ca01b8b564a76fc29e3f9d551bb4b 0xf2d94d612b733256aff3e2d4f04a3a077f108db7 0xe288ab6082414374aab822164b0b6ac0510418f2 0x7a0fd8511936aa452121f183bd6ba586b1de230d 0xed53efa93f8aa87b63fd4417d8f1709cce1d35cf 0xc3405ff3435070d82d2e6c60c530f1cb8160e826 0xb58720af396bddacf422eebace56c7e062d6b86b 0xdc6a603758eff038fce2e8e1888183e49461f029 0x2a334500a24d5c701733f1313bdec68c688bc329 0xf1f1cadb1a4614107e06d6c4267071d1436153a7 0xfb444eea02d070bdfb128a88658713946cb530ca
