ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-62F0676C191E
|
Infrastructure Scan
ADDRESS: 0x4ad4d97836e7d442e37fb7de20cf39e1f79b8ec3
DEPLOYED: 2026-04-24 07:08:35
LAST_TX: 2026-04-30 15:00:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 712F245A. [NET] Synchronizing with block height 96894. [FETCH] Metadata hash (IPFS): 50a17850…a82da0e0… [SCAN] Mapping ownership-protected functions… [MEM] Allocating stack frame for EVM simulation… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 33 iterations. [TRACE] Execution path: 49% coverage. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘712F245A’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x35bd25d60c594a77f13eaa4ecc058ea3631a620b 0x8582e7626ac9d23a6a1d176f5770c4c28b87bd97 0xbb7dd311f47b084377c26e61d8dc6d58bd57015b 0xfeaad8ce5b22b822af7742bc93869bad378d31b3 0x016c227337e68200869c6c0a944fce0dd97e7d8d 0x5dfb1b3faca9bbe7b497c9b1e55cdb083c65e998 0x2c254ece4b5d5b0c05651e279c4c02f904833294 0x8f90905565451e099595388087c3e05ca6bd5111 0x929aec3fedd58c4c95be32cf72df65894b90d864 0x4a10ce20cec8266c32d106d72314549fd631d307 0x77fb8f84c51b00d11b0465379076e123f87837bc 0xbfbc215be39f2e0f8b415574a3ed68a5f7af7ade 0xe7dfe204b545704839e3eb109bd6ce91684c17b3 0xc5baa7453dd463458ab4c6319b3ae736b4263422 0x0472a736d143426b4f747adb535a94f3fa4db678 0x6da9e98d7c6a7f27bde79826ed43afe6c6d2d3a9 0x881904e870d61b14462ed20e253cf0a2cd0a472f 0x8e54a03d4c0b20223f8980800a83e58152c7099f 0xaaefdbd94d5994791a881ce68cd91d56d5880d98 0x3e641a347d86e870ba1f2ffe2331e722436f5b45
