ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-965A84CB4B2E
|
Infrastructure Scan
ADDRESS: 0xe0f58edc831088ba1911e91df3635c22f3254258
DEPLOYED: 2026-05-14 12:08:35
LAST_TX: 2026-05-14 20:53:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Hex dump completed. Entropy: 7.56 bit/byte. [SCAN] Mapping ownership-protected functions… [MEM] Virtual memory mapped: 0x0000 -> 0xc52d. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Balance check: 1.41 ETH. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] No critical memory leaks during simulation. $line = str_replace(‘b4604eb3068ff10f45f4eee744ca703f3be3b84d3a2afa370df2518ca8c1834d’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x03ff7aaa1cb3762b3b1464b7a45bd8f1c26bef6d 0xb64e40338a4aa0cf49b01135b0cf06c9781850ca 0x0fa32cbc66647843b1211f054f43eb25eb249b40 0x6d8d09f18afd74e6d6d0190ccdf89de8fea54206 0x89f9ee68400de29d48d922f18cead9f917c41594 0xecd0b98a0be75341e51f3509fbc02c4bc28f0ec2 0x2dea2bd9165d9fa192d12d5666b19285b0abe5cd 0xaf8fdab6c8554cf799cd45cc8a0541770f462b2d 0xd193796fa1adc149d2c3647eb23feabc3ed64513 0x35bfa39b399456e80c7a45a6ffa4364852be056a 0x7273120a8a1ba1326a9dbe6dc2d294c637ad30ce 0x6c272b0057caf2d19b314a31c26d9d6c54c28de5 0xa8969f1861c2dc8b160df992bc988a30f2cb50e2 0x8b8b6107e08667159e64911bd7f6771b190bb97a 0xb01d8acab39ece6fe7682125719de1215fa9fafc 0x325c3eaa282f0065722a748794776d8eee244fd7 0x27cfe7255247ebca8521ae9c645cdab0118caf4d 0xd42e46c773065c34599f29c233d784b669b1bc57 0x88d5f231738e15e17c139ecf1eb4418830afb43d 0x7efc5ab4179c5544c5deb1d72e401c127d7e8fa1
