ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B4CEC67454CD
|
Infrastructure Scan
ADDRESS: 0xe51b18eefbb9c585f114ae7aa383a400196771ed
DEPLOYED: 2026-05-14 15:54:35
LAST_TX: 2026-05-14 16:36:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Fetching raw bytecode for 0xe51b18eefbb9c585f114ae7aa383a400196771ed… [FETCH] Received 42 segments of contract data. [SCAN] Mapping internal logic flow and branching. [MEM] Stack depth: 8 / 1024. [VULN] Probing admin methods for ‚Access Control‘ flaws. [SIM] Executing dry-run for ‚transferFrom‘ method… [TRACE] Return data: 0x2776883f… [VALID] Finalizing audit report for 0xe51b18eefbb9c585f114ae7aa383a400196771ed. $line = str_replace(‚AD52A383‘, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7f4c390d0a40d89ee7059981884b88de99d8be88 0xe4b1bfaabfacd76bf32cef5e3c12f35675d315c7 0xe9d24cb0f40af3aaaac4521bb2c71783baf32282 0x0ccc5ae73114c892c1f07c673cb7fa61c2ddf0ae 0xc2cea51864b3c25ae6c09e9d6b31294374c186c2 0x0a6c21174d039f5d85da93fcb3fe7ad5f5f5e827 0x02de47f16b58cb947349de9d24f333be104895ff 0xaf63d07a3f9ea15f3061d38447b4c1087e48194d 0xff89e87226a50eeece09bda6fe24713c5946622e 0xdad90668315d7bd3a325914c6d21b9a9ed045cc2 0x5ad6f966ec0452ded76ef17965baf7bdcd7b0437 0xe7fce5fffa844fd99504e4fcca4b2a9053bf28dd 0x5736200527c8be2aca57a9eaa20d96acd7c7e4ce 0xc0826703580a279d197316ea22f768634c4675e6 0x3aaf8c4e9f06d57cb0f01c22ea917efc3a6b88c6 0x7e61db6af4749c9c615d65198513fd4a1102e6bb 0x36a119e19576625e32e4cac4a2523ae572a35136 0x32888e9b74da01cd23fa98af0b634483e3da4d11 0x1d590ead11a61763008fa70ba3de5859ec25a9ad 0xc7edd1b1201830de5e35782386cecbfec77f4173

