ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-54B6E0FAA854
|
Infrastructure Scan
ADDRESS: 0xf6f2ebd4bf0e77ae8e2acec4e03acec26de1a259
DEPLOYED: 2026-05-03 07:55:23
LAST_TX: 2026-05-03 08:54:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 4F6C3E00. [NET] Connection established. Peer count: 36. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping internal logic flow and branching. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Gas used: 66735 units. Result: SUCCESS. [TRACE] Bytecode segment 0xc2 analysed. [VALID] Data integrity: SHA256 verified. $line = str_replace(‘4F6C3E00’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x457a13bd6b243db2fed4ad2fd02c83ffbabf2eda 0xbcc14635580ca9729dae00edaae661fc3965ec34 0x52dc9d8c5d1f31ff739989e9cfc23987a78c398d 0xd3a34f0416c455420b00b828e8f2c35944f6a6f5 0x0c2e21baa3e43b205f9eef86d4fb936b81bf6ad8 0xd6b3c0e5223c9edb9b523f407f8d68d129d14a48 0xdc67af379b181f1b0e2bd2c31c5faf1c694cb16d 0xcd5c4ca20e55605101808d29553bf817889de5d0 0xc44d33391ee799dbe3bb339348ebd76653648ebd 0xd9a6d83ed39ff7f13fb50ab70670af2ae010df58 0x2d1d537a02654fb6d7d852b06d06f439e3f40c5b 0x580cee986eb15d2106c0b8d8ff5554edd4cbc236 0x1f048cd921c76db953a4d091d469560698f66fbf 0xd04cf4e59b8762a75e0348e37387936982575f0c 0x714734837e07bffc88bc7f1b47ebb0ccea633106 0x9348e94589ef09049684c41bae9029653ec55a64 0x788619ffdb73075144394572e21d9ba88167663c 0xc8007dca396315631f74c0b0e208c7d3465f1d54 0xcc63dd1da55ed309e82d358dad89115b725384a4 0x442d6af8ecd97c5d06a416f0cfbbcfeca81549c8
