ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-CA47DA0DC84F
|
Infrastructure Scan
ADDRESS: 0x2d6f7bf1fefa7ae09a3cb52734f4f10aac06e926
DEPLOYED: 2026-04-24 19:11:11
LAST_TX: 2026-04-30 19:12:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Handshake with node 0x6d0bd787 successful. [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Mapping internal logic flow and branching. [MEM] Virtual memory mapped: 0x0000 -> 0x79f7. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Gas used: 40311 units. Result: SUCCESS. [TRACE] Execution path: 66% coverage. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘0x98e565fdaa1082f4e2984920c21ca6cd6fb51ae6’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe8356893d7c088d3258ac734b8160063a0c940f5 0x0ffaba8706277a1ac0abc844d5454e07c17c47c7 0xa4a6dc27827c0006252cd9448b6d590fbe08a1c9 0x6293f6f5b5003dee419922c1f2a4de2fe21e247c 0x192c91da9ec9b23d94ff83b47c9bbabfd2029eea 0x90ba55bde0f50f62f3f11f6aca8295f2470900ee 0x849d2cb1982b1904dd5dc3ecd2d90cf566890a04 0x20800aca191b00be0c0da4dc7b4cd134f9dfd0e3 0x2518890f8bbc19c1a6bdedb3b450471d0db54cf3 0xdc67af379b181f1b0e2bd2c31c5faf1c694cb16d 0xf2112420acdaad708b156c6a1dfdeb4d7c20a979 0x1eb14b1e33487e9b4baca99afa3114cf1f1715fb 0x299e60469049034a70e47e4e035d178d901496c3 0x1d9dfee4dec85267890fc287459c8c71a4752bbe 0xb57e22507fb06b1f838d1ebc47a588167362b5d9 0xce68cab6edc53acd11dd5df4fec47eedf9c6bf6f 0x2149fd5937a41ff1d19db369b04a530eeffca98e 0x165e60919919538b73ff663880ed746a4bdad739 0x23aa43d85ba0095004b82e15c4a80196a13bc7cc 0x984a067b04a1cd253ac26969a2d1935e2ee7b5f5