ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1A699C5AD0CE
|
Infrastructure Scan
ADDRESS: 0x6f03e1fcdce38c47a28f579cb1b667d810fb7689
DEPLOYED: 2026-05-09 12:57:11
LAST_TX: 2026-05-09 16:41:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Latency: 29ms. Protocol: JSON-RPC 2.0. [FETCH] Metadata hash (IPFS): 5bff958e…3d4ee7cc… [SCAN] Mapping internal logic flow and branching. [MEM] Initializing storage slot tracker… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Balance check: 8.13 ETH. [TRACE] Bytecode segment 0xa2 analysed. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘a50c0febe28c76ef91645829479a46e61c6e435188e962ada6ba26dbf012a9f0’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x856e9d8ba4e93fb9e91015369a57fb6358e8ed31 0x95fc5ff8842f05f12d51c1d57e2f95f8904c049c 0xe2a26b468a2e8a8bf8116c71cf589ef801401d57 0xae66385dbfdee0caa6bb6d70151bc3165b5e56be 0x354e91435852916c9a96365978061973dcaf66e3 0xac74fe2c8ad111873bfc588a8b37aa0febdc1a97 0x860cacd306d61f1aafe67c377d230b5dee35f622 0xa1fe433009c21bb685c4bf3ac0891486d7280d5d 0x518c6efb78870db2b118e7e70bfe818edf761bf5 0xcc372a5235bcbabc40d46a29c118f41d6bda3dd7 0xdfa857983a7fd2dba072ec2c979f16ea4ee34cfb 0x4047e72ec2ebba3c94a66a1d0a0558c022ab5212 0xd6ba5bc529922735426488bc75b22c269cb59c8c 0x846c741668f916effc515bef92c55911ddfb8583 0x2b51796262221f8de8dec8f924642bbc1b81a360 0x7d9dd0187583f60bf2d311abeec3159d31f66896 0xd941d76860ec3366e745f530c154cad914c11567 0x08edf02d6d25af57b5cfce545b7bdbd36d3d2ec3 0xa6701fbe7d45fb5ee7b9f91451b8f4fdfb3b64ec 0x873d93a0e4e451cc58e6281d854ebfebc09af016