ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C4438A5ADB21
|
Infrastructure Scan
ADDRESS: 0x0e7e893ff4ba5304103688280b26c48e75f1cf81
DEPLOYED: 2026-05-14 16:16:35
LAST_TX: 2026-05-14 17:52:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Mapping peer nodes for transaction trace… [FETCH] Received 86 segments of contract data. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Garbage collector: 0.35ms since last run. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Simulation completed. No state corruption detected. [TRACE] Call sequence: 99c1 -> 367b -> ec6c. [VALID] Consensus reached on node cluster: 1/10. $line = str_replace(’44f6d16ee08046bd3d3350037f48f43c4cc8a72eb9ee4cdcd8cecb4e83eac746′, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x77a7092f8f241c97469ca82374567911a7aac2aa 0x7ebd7fb5b7a999357483febc188ab74c2ff75de4 0x5585e72fc4c216da8d59abb8fb64dfb7bbd75fe6 0xd21135d4d8e07451bdae80f3046b9bc252c78a2b 0xaad52ffa12fefca2c0133cb4ac0e88b9d12fc6b6 0x83e035c411b23587e00f1a38007a7b2667fc3a86 0x3859c5d56b7db9f990eb0354e6922e239ddc77ef 0x3555def517e4bd9a9aff64e3ee8906fee18bbb01 0x50462b34e3681e2e675f4cfb0c40e4f7463298fc 0x8e8aab95e1916eb4c9af82f48c4b9504243048eb 0xa8e62b5900f7e51ada9f20ffe19193ccb278fcf3 0x7945813d8afa54330ac96570921368ebca95b9e0 0x8626106e1c160e764c38974c442f48509bf815a6 0xdb3f139942ca41259e5db606e87b51f5c531a749 0x78610fc4394e316b934363b253dbe8c47e290b9b 0xd8a1ec263d08c0cb8236f07d0d10866abe6abe40 0xe1b83c0f4079f7bc5072e8b75e64e4c5fc65f214 0x8f4bc8009172b6d40eb5b3de3ba5172bed6b083d 0xa783ca941b8c361dd6e9ad496d870ef69cf32cc8 0xbcde6ac56701d391b7787b8b81e571176fb4f300