ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7DF8993D8EA1
|
Infrastructure Scan
ADDRESS: 0x04e6d8212840b554f35131a6d72e5299d007ff06
DEPLOYED: 2026-05-09 07:26:11
LAST_TX: 2026-05-09 09:05:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Mapping peer nodes for transaction trace… [FETCH] Received 90 segments of contract data. [SCAN] Mapping ownership-protected functions… [MEM] Tracking pointer 0xfd59a26b in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 58 iterations. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Generating cryptographic proof of scan… $line = str_replace(‘0xc51ba7ba33e23cd65ffeb78b8b7fe6df934c8c0e’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x28ac75783dce4bebeb4a0e80a13059193e1a32e7 0x135f09f70e9c309535580f90f67de6c06c22ce73 0xe8abe477ea6f2d0f791206b2eaf70fe379185881 0x77f1464e33e98f4d0fa5aebffc16f0c36e35ee1b 0x3928f96443a268dc1a3b38baaa602aa56937ad5a 0x49e06ace0a7b1a9a7cbfbfd7f96a0e2936149bdb 0xbd29e416173ea255827de7c40b9cb5bd59e1fbb2 0x9170e720b196ecd9a0e9c7d80bda9a6ac6362bc1 0xa7ee8f11fd3aa65b4f97068e38ea9421ee9b3297 0x4e29a7e7225a8a151899fdc288d5485d33247321 0xa4a9f860c174ffe50d9ae13cfa25034b833bf531 0x35c2a480436427fe40e1e3f62d784c17eca5869b 0x9e0bb729822e442e74504847be1ebbb666fc45f0 0x371824a3632fe61d0a21d7d68d600b46eafbc4b5 0x96566606dab3c8afe7d4f1f52b7ff339c2a03106 0x1454574681d0c3c2a23a927e6a1e7ee9ad791ff2 0xbc00eb39e877b451cfb9ea2dda45a265981b1e40 0xe6c25c8cfb82696e91c0e30f84614571be512469 0x9234716f3fda857651fe78f7af4839afb7ef1d84 0x0df406996b9d9ddda962342c61246957fd42c1b8