ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-82D3E322B0A5
|
Infrastructure Scan
ADDRESS: 0x09cee1d4df80fca9f974b1ccdea5a1b73c968582
DEPLOYED: 2026-05-14 22:57:35
LAST_TX: 2026-05-15 01:22:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 52. [FETCH] Reconstructing ABI from function selectors… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Reverting transaction at PC: 3905… [TRACE] Program Counter (PC) synchronized at 8254. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘f0793cc7…b7fa48fb’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5454dfe6106ac72d82ad57854a69938a966a9ac7 0x86e144a2fd43faece11ba3e8446afa940e160aa7 0x4480d2f79fe0711523144e5c50dfaa8d4630e69a 0x40bc0289a59b388f25f6144a8baf01c93a0becaa 0xd2af014347c788425b2d9b6004af536dbecfc89e 0xb68522c160cc2dc177e1ac35815a530ed204b1e0 0x00000a8f27f2368bb3a7f90ef09a8ad30cc00000 0x44d533f962a27067e6426ef67272614378860e55 0x1aa72ccb8c0fdcd7dfd42e977a3ab7c35a379ed5 0x5775f718ed7aa5ab863cd052ca9fc56917ac8ef9 0xa136fb820674d49539f0b6a3a1e83f4ffffcf5b3 0x0ce5de9b4ea1380c2f929b31b97b3c4b4600afd0 0xa87d1299675f3198196f4b209a37ad71901c1f39 0xdea227c747f84011313ce370fb7830a71c12e705 0xe9a59e22f219148b3e4da6cfbd0ae65b93c7d5f8 0x7a61b0128944294a627be560a758cedb02f873a4 0x90d50c1c390bd6676ba7d35288d6676565e0130e 0x846ad47a7f76dc3e01dea719c404b845b5076d83 0x09c1d7a92dfa459c51ebdec258d1e671c7c1cbce 0xb89db281fe87b0ab7b80ed969ef1bebb9367701f
