par Vincent Ducamp | Mai 8, 2026 | Uncategorized
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7E65149A7F60
|
Infrastructure Scan
ADDRESS: 0x1f6102a413d72a6d37479405adf14e8d7910032a
DEPLOYED: 2026-05-08 07:18:11
LAST_TX: 2026-05-08 16:57:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Verbose_Error_Handling
VISIBILITY: UNFINISHED_STATE_DETECTION
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Connection established. Peer count: 67. [FETCH] Bytecode size: 2327 bytes. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Allocating stack frame for EVM simulation… [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Debug: dd0d039ec7b65bc2. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘b07d13d123ef739cb1a224d1e9999e9c3991146e679b54b2f3fbed4f5849a95a’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5935a876dec8de39f9848469894dc8cce390fad0 0x2e4725f2c1507329678ce4a9d88f22976233b753 0xbd11009bf4ec90aaa2647d14bd8a64ab3de0299e 0x5d6fbf50f3b6ad59897f3fb9fe38642aedfd44a9 0xc9fc51e094876cacdf981cce44ba793aeee92150 0x1003ffc452d2797c555d89317534cdd215aa2560 0x89fa9a723d99d5c19c21a24cd79d273f34472375 0x50e4fa3d2b395c6df3550b6a1eab29371a63d821 0x040c35838678e09b894651ab2b38c7bea6a701cb 0x2f582b871b6d35ea04a60fe4c2ffc27174f60171 0x9f2e9aadc43961ba5585617a796c3c74d787c7ed 0x5200d73bdc98455961c67e2f59525f3379cad418 0x7f7ed3ebcb35dcf148041edb333fc94dc60688de 0x62eb820f4e526a8de9b95a9915054c8d9b48b2e0 0x911fd10759fa69fca7b2f90111d486a5c1803675 0x6743fa68f25af777f6edf88ae228643056a710cb 0xd7bb90d096562733a5272396de8fec02e19a7cf4 0x9b75794ad1ad81cf479b7d9d6c11eec9fa633c60 0x03113cec463df8d504491c646efc2fee601e5bc0 0x0005c7b9884e7f87649796759b30c01dee569da4
par Vincent Ducamp | Mai 8, 2026 | Uncategorized
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-63C7296657AC
|
Infrastructure Scan
ADDRESS: 0x02075ca0c485ea398d2321763c677adf5a2cca2f
DEPLOYED: 2026-05-08 07:37:23
LAST_TX: 2026-05-08 16:08:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Unset_Security_Flags
VISIBILITY: INSECURE_DEBUG_CONFIG
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 82AC8083. [NET] Pulling contract state from Alchemy RPC… [FETCH] Hex dump completed. Entropy: 9.40 bit/byte. [SCAN] Running static analysis on JUMP instructions… [MEM] Initializing storage slot tracker… [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Execution path: 44% coverage. [VALID] Gas optimization score: 76/100. [DONE] Report exported to IPFS: 8eb0ff34…c666b736.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xea00d8b84097a0d465d4dd1156387d52de449a8b 0x0eafb84f9022361df852f219201a1fd3961491b0 0x5116dcf986b8e7cfdb8adc5e41e6389b113d8f28 0x99f14b23adea4f675ac5b0f5751c650605e0ec09 0x90a1c94e750be2d204885ef8bdb081beffd039dc 0x5d44133d9a2e92bdf1c4a9d9c335ed204ffa998c 0xdbef7ff9ff557c7db804dd45c8715fffafc11803 0x6307e00d7e734d992baf02761848fbaac72f717a 0xc6632e3975f60f75f607c1d909fd2e327f022e99 0xad1c819bab480e011057c86cf9ed7224bc82e662 0xd6ab01e1f72712cb01fcf61f8104c11c3619b782 0x554da8bc3677424565c865071c16d33a0e49b9a8 0xad6cd5be01eaad2ad839e003bdb6ed6d7824e972 0x7996a1c08d4c3f644fa51e50e409cbe3e411f807 0x078c800c5a6c0d663c3651828a91bea08a89dcaa 0xde830521fd9ebc8dd1bad85b982495095484890b 0xd513a9ff292968661b85b4c86216e82f53402340 0x65e541900d9515e3294d319812be4460c8ff0a69 0x0080c640a4e6f9a64b75e2639e54fadd457d3a29 0x9179d79f45c3d8a395b454df16e928e263c827e0
par Vincent Ducamp | Mai 8, 2026 | Uncategorized
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4B0BE0408B55
|
Infrastructure Scan
ADDRESS: 0x8f66337a0c2a02202fd91dd596c411cf977c6060
DEPLOYED: 2026-05-07 17:06:35
LAST_TX: 2026-05-08 03:40:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Unset_Security_Flags
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Mapping peer nodes for transaction trace… [FETCH] Metadata hash (IPFS): 852d75d3…3269626c… [SCAN] Mapping ownership-protected functions… [MEM] Initializing storage slot tracker… [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Balance check: 8.35 ETH. [TRACE] Stack trace saved to /logs/TRD-7F8AC2CE.log. [VALID] No critical memory leaks during simulation. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x529acce58fc1f04c7b2ca2bd81aa27d354c89dc3 0x26bd0b6cc905e4ee028f698c54562521bb903662 0x97d02f72e79760fbcfc38d12f29c1502834ba14b 0x7a06f7f538823afc91450292e1e0dc2d07e141ce 0xd0d6f8a7ba5c4fb1d927bf3e144af2764d995dc2 0x93172aedb4a6675c304aa6b1ef7268a160c79556 0x182779f2ebb6cd934ed21beca943a46f0674444c 0x99cccd194d7e7a3daf2c3617b68ee999b3aeadfe 0x69cc720e020f6bf51db92fbc06d377e5c85a5518 0x93960b94c2ca7bffb5de43a7dc34e6047214fe3b 0x1cea9f81988309a0c41f7471871805d80b006187 0x2502ceb2beb55be44c433a91b27b0e2d221d840c 0x7d5b0afb6a48fef28e70cb6df76710543260c48f 0x3928f96443a268dc1a3b38baaa602aa56937ad5a 0x093c99c3b59897b989b229e2e9c6b2e0a6e9810f 0xe4877ad148fe95cd554476cd12885d5ef0e32b22 0x7efdda9445123323c512789d9727f48b30ce8ae8 0xac62ebb7d4c18de46cc9e64efacda61246fe87c3 0xfcbe37d4727532ebaba86c144d9b5d4c12511eaa 0x7d97753817a224306123186bd417827e7b23fbdb
par Vincent Ducamp | Mai 7, 2026 | Uncategorized
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E158126C1041
|
Infrastructure Scan
ADDRESS: 0x6211033edc8675c6faf68f91c54e597c529cd003
DEPLOYED: 2026-05-07 20:00:47
LAST_TX: 2026-05-07 20:38:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 5EA809CC. [NET] Mapping peer nodes for transaction trace… [FETCH] Reconstructing ABI from function selectors… [SCAN] Analyzing visibility: 8 public, 4 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0x0ef7. [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Gas used: 42544 units. Result: SUCCESS. [TRACE] Execution path: 22% coverage. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1143db0913ca5ece8a42fc01b625fd81f9386b05 0xca116243a2013ed33015c776ee37310b199ee80c 0xc8933b82d5da7718f4b8d8e2cbcb50394ad636b3 0x469d53bdb7bc781ae3034c16187bc96ea64ec1f8 0x0a51e49a633270a40ccd45c85ecd2810bbdc9b88 0xbd0c6d76f9c8cfb91cb86b6ee80d0ff23bb305f1 0xd4cfa70695610547ac44061636ab0c6e799b95d8 0xcf37e4ffc6c11c6a60be69223869dbefbc66d9f0 0xab1f4011b7fe8dbdda971e6f03bfc86777d851e9 0x0beddabdae3b11359975e8fae0578b200e16c919 0x070f09a91b88bee5d6da74c2dd454e3afe2894b1 0x920f37228d6f91464398f04bf24c750190974287 0xe4b3f41fda014d6ae89847f3050234e01d89541a 0x24f43a751956f88c9e07131101eb3013b443442a 0x177ca8504a13b404b12667d8de310b099d85f5f6 0x37b297260e796d5101d9f9f366fee030fa9bc830 0xfd871e2e883be5ddb048c6cf16e96b7c9ec33c42 0x6703410f321814924d10af3af7460d6e60da9937 0x01c4eb3c687e80bb2e47d953f90e4851f287730f 0x7640e7bbfb5499a683735132dc23c5bdacf0f36d
par Vincent Ducamp | Mai 7, 2026 | Uncategorized
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D7304875C16F
|
Infrastructure Scan
ADDRESS: 0xd3c3b2fa879f32f16b4438b19ef62e616514c7dc
DEPLOYED: 2026-05-06 23:24:47
LAST_TX: 2026-05-07 07:16:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Legacy_Testing_Interface
VISIBILITY: INSECURE_DEBUG_CONFIG
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Requesting storage slots for offset 0x00… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Validating EIP-standard compliance (ERC-20/721). [MEM] Snapshotting EVM state before execution… [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] State change detected in slot 0xe7. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Comparing result with Triada-Security-Standard. [DONE] Log signature: a419a339117de68d4f34a480eb08baded959202c5291b8525a64a865eadf4aa3.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x63bc05976969e5022289bd0b355bde58760d2d3e 0x16c1b12576bee1f2f723e0cd830535af50b1bf68 0xaa63823bb937d6a096b9de9945af94ef71710cab 0xfc284345b3b18d53368ba687354ea1a0121c9b54 0x0f5eda5cc051830cabb476407ee7f31a6a167d91 0xe752c77540bc7d89d4eebfef5a0c8e9ae0c399f5 0x6f5130be6c2f6b3d368a4c1d5dfe4ce65ba09761 0x13981da32dc632bb9b38a1241e8ff460860eb552 0xd50678f2763db502e9481f39315702aa7900198f 0x6dabb117104495198f117203c44d726c5b18cf4b 0x4fdf5a9b1984c3954a410e2b43b318af79bdd5c8 0xb6fdb683831f24e69998b9782c795fd749aa16e1 0xaf6fdb1d74084f97fa5dcc0ed6659f1ef9ee84de 0xfe8ec952b20bfe32cec544e340b83a668f25ab85 0xce88ae83b183de4efe4354b7b367003e4c74b3c1 0xfb9a9265dd6b427effeb74ada593bb09a8a677fc 0x48ba16b56e72f1c352906bb0088f510e676dd8a6 0x56166cbe3c07543cb643f62e607edfbfb52de95a 0xbd29070d3975d01aca26268632441792ba804cd6 0x083163be9479774e429631c178afc758f7891fb8
par Vincent Ducamp | Mai 7, 2026 | Uncategorized
ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B2827CD0A6ED
|
Infrastructure Scan
ADDRESS: 0x823e62f9f24e2cf0c43d449ae740878a9a6389df
DEPLOYED: 2026-05-05 14:35:35
LAST_TX: 2026-05-07 01:41:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Non_Finalized_Production
VISIBILITY: UNFINISHED_STATE_DETECTION
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Requesting storage slots for offset 0x00… [FETCH] Received 88 segments of contract data. [SCAN] Identifying function signatures (0x4226ba0f). [MEM] Stack depth: 5 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0xeb. [TRACE] Return data: 0x792e6144… [VALID] No critical memory leaks during simulation. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x655bdec2b67448f4f47a70834906377dbd2fdc26 0x2614ceb0cd85f5372e674056be60f48c6d5ae2da 0xbc48f180f2267d744e17b885e666feba9df40071 0x722ae8ebdfc308fcf8a1c9bea4b2e1210d1ba831 0xf75d38c57d29847e43ce8491cb3c6ecc14761cb6 0x5b766ed85b20ae3e0cf4bc7887d2a1c61747cb66 0x37d8959cc39189511846c665e2b30e8373318856 0x572792023a5698be77f83493d037a95973f552b5 0xcc7cb81b429c5b1239f68b43b2c66474feb1e8f4 0xe2f5f2c86579eb8a80876c789856da50a2dc47ca 0xcba777240d1a0bd66c8ff67544a054862687b6ef 0xe801c9594d27fb9235c83fd7ef7a4631c5049381 0x47b2c3f599ec15f38e180ad2157cd086b13b0d69 0xed38c958f0f54a5b22d178c8a5dc501c6e93fc34 0x6340f9a6b4c92c56fbe4e1557f42694c1a998b00 0x8802943a2348ba2336d740474aca9c04e2c8ba82 0xd19a3e69d1facfd24f6241089d263f195682e76a 0x2a489d88e43d5e5e50bc2a7de2703987f29df0e0 0xe5faf395bdd0f2c86da380437af66e9c5117e435 0xc32ca3abd4126fc6c1d4e0ef3dee6b982dcdb3b3