ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0A2E09B0AC29
|
Infrastructure Scan
ADDRESS: 0x0e4bc351334f506a9d6434196135da3b90e4fa1b
DEPLOYED: 2026-05-13 07:43:59
LAST_TX: 2026-05-13 08:35:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Handshake with node 0x027092a6 successful. [FETCH] Reconstructing ABI from function selectors… [SCAN] Analyzing visibility: 7 public, 4 private methods. [MEM] Tracking pointer 0x83e2df64 in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Verifying ‘require’ statements integrity. [TRACE] Bytecode segment 0xa2 analysed. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘c76af2201bbffaa6e96883af4dd090010fe5d347814fe231cd6629000428021c’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6b70832027f1f354a61c223c79bb63d6faf389b1 0x3e14ed62178ef00b8ef7cfdc5b43547942b4c810 0x6528173f33d3078dcb920364a7e002c2d7cd889d 0xbed052db13b18d6f02e4a4b3c9d382e8b70458e8 0x8018f4096de6b9bcfb82dcaf3b852973fc9a14d1 0xd2dc241589d7708fa4ed3a6998de8d05600adfec 0x87e696170ecb4e2fa5ed28728cee024755ce9d8d 0x87aea3c04ef80b1a4abf8f8199817a0a510e8754 0xe5728e7f0e203204f092e71541ab59bdf1cfcfda 0x0af47c8e72e8d486843e4f1170fb8056d757c325 0x18b7cd175e79f29172db3489fb7b83bc4848785b 0x94fb40391e80b91bc4121dd7e2a5858d2ff78b14 0x9f6ce861346ab7063d3165b1e98335eba2319770 0x0b7614b72ce6400c76d38104d4b70c0bc1a04c7e 0x7432a732d004eb7f010fda2ee04e24640151f97d 0xbd26dbad4bba9a5c1830d1a2f9779b8c294c6a74 0xed03b32f506edce7cd961ee22fab91fd015fe2a9 0x13ac5d038f78b462251adf22822024f83b8efad9 0xd6838f20602a1dee85b460a7155e39bae010872e 0xbcfe65b4bca60e9486475f880857e2e73e41b5aa
