ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7E214D5000A1
Infrastructure Scan ADDRESS: 0x38e953f0e073b7989fb0cb4f1434f3035252c465 DEPLOYED: 2026-04-23 14:52:11 LAST_TX: 2026-04-23 15:04:47 | Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig VISIBILITY: ROLE_HIJACKING_POSSIBILITY |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 72230A64. [NET] Pulling contract state from Alchemy RPC… [FETCH] Bytecode size: 1818 bytes. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Snapshotting EVM state before execution… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Testing edge case: Zero-address transfer… [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘0x8c8d5971ab8c41115f93fa4e7a3e469e5102641f’, ‘0x’ . bin2hex(random_bytes(20)), $line); |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x21c415d650a7d5dac96ab7cadbbfc73d3684b268 0x69068643d4df28b5654dad4c0460bf702dd72151 0xe250b0bbe47e96e50ff4df4ec1a3fd97e13a9fa9 0xee28ab94280ac9c0001ccdb898d34832fb1a97ea 0x96079bf2443effefe080ff4ccb9a00b4eb5fdea3 0x35435fdff8ea8893a0d9f58487980d84c2e49536 0x4de1cc789d0f9fe5ed7443557a4b326dad4aac66 0x8feb078016bf69303dd79202c630aeecda46d3fc 0x36755e41008c1b9f88c6639a220280778a22d0fc 0x15463e5f5487636b4ed9c9b6c4c2dc90ae334b68 0x4cc9fe24ad50cb5ee5bc4db56a05490162bc2a3f 0x924a4b7e1d7ccd3d5e5e0464ac881dea4edaae1f 0x1f704b2608a9208b19230ec575abfb7517d4f1aa 0xeba743084fc06e5c9c49c7ef8946e966a803f4b4 0xfbdb8e55c4034f0f11e4b4f5c751f69ac1b00404 0xd2e03b38ece9e079db6c3e155d7c9c549ca4d5e8 0x84df5143e45755b1bf204e1ed5b7e1cb2d3321be 0xbe981c7156c86927a72a133742f6a44e963dbb4a 0x420ee541be489fea590d8104139aac48b09deb0f 0x7fb719fc99a737ba15d676a09491805cd9623a8f
796da11b4014dd2f9b49aac57e178322
