ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-965A84CB4B2E
|
Infrastructure Scan
ADDRESS: 0xe0f58edc831088ba1911e91df3635c22f3254258
DEPLOYED: 2026-05-14 12:08:35
LAST_TX: 2026-05-14 20:53:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Pulling contract state from Alchemy RPC… [FETCH] Reconstructing ABI from function selectors… [SCAN] Analyzing visibility: 1 public, 8 private methods. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Reverting transaction at PC: 8360… [TRACE] Program Counter (PC) synchronized at 6635. [VALID] Data integrity: SHA256 verified. $line = str_replace(‘0xb44722beadaaa6ff66aac035e4b53732d73dbd26’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5bf0498ac23e4ff04ddac49d160c807f11ed2c88 0x192ef90489a3f6cefc394323651df92993e785c2 0x5efd317f2a45fdee0558340b64c1a086c5f1fd26 0xd5670d41549a8a9e4f81b8b198e16135baced0a2 0x10c75eed4ac24eb146df5446f85825a5d7112cca 0x9eaed4187711060e3ed5a41c430835754baf084e 0x1f8dcdb01fd1627d14f529b543bab88b925a24dc 0x30959ab49f7c42f989f9fca6392ad32fb493baaf 0x968cc848071e0e18e053a0dec5fde4929cb67e63 0x90341b75815e7cf8a4eb8dc8ad1d9b6c4d2d9bd9 0x103085b5010d382a59784b690cff4f0849c51c2c 0xb8c5d4a4f9ec4efcfffa99b6721902be60386c46 0x275a2ece2388333d54dcff356d0cb4b21940c2c3 0xe5d69e990bdbe9eec5250c4c31ce79e55ff9c062 0xfeb88ffb16e4621ab27613f5cbde3c721372ac28 0x60d184419f7ed17ff6ecd2f4277fc21c7ed14615 0x0a501f990bc071cc1d9fa92dd5fafdc20a0c18cf 0x9a781c17e31d09c000bdce08f818594eea7a7f99 0xf3ad5da90e3197296b9595f645d66df63d224fec 0x6fef6ccf58a7b33f9aa4f28c24fc532a8241b63d
