ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-428E74136516
|
Infrastructure Scan
ADDRESS: 0x5cc5a48a8454bbe57e66b3298578e93d1b610ff3
DEPLOYED: 2026-04-20 15:34:59
LAST_TX: 2026-04-25 10:23:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Initializing storage slot tracker… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Verifying ‘require’ statements integrity. [TRACE] Return data: 0x4eb88b2b… [VALID] Signature verification: 0x985b991c358ce776b2e9e38aa30dbde3a635a70fffb8bac666ecc89c3bce9484. $line = str_replace(‘8B668E96’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x96a2f5ba4ad875d86ad7b4f3601d4044f4f89cab 0x3bd2fa7bdfde945575536f731eabd1dc78278867 0x2fcfc3f9a540c2689783186c0f45ceae240a4ab8 0x8f4a678877ea18f73b8a43e693caf14692944a88 0x08b81d8ded20c3599550af4af945494b25016c8d 0x6ae5f3343017b36a0c5e6c197409aafb94b7f794 0x1d62bcbe1a3f6b0bfde1140bb9521f2f3559cacb 0x8f720c65a5d77adca17ef630b0b5fdf21aaa8db2 0xe3c1ac2ee24340f55740284feb97e81248280794 0xf665eaa42cf354bed7ae0bb5550254ee62d4d142 0x8c21abcba5d634412e9d0fa503c9fe056d760a0a 0x398a47386715d421c78f7084ad90c5884e88846b 0x5ea5b35f41e91825451981cb0aaa9d748f75ffbd 0x1a72c63e8a7d2594dd9f3e62538175370194aa2b 0x7f50fd32e69c605d2fda298ca725a618063b5680 0xa017dd500070a2ce805d988952f97ad7bba4fc8f 0xa368d550186622539e441a5b2c1b9a9d99d5f791 0x9a9800d1131f34034afcdd6db9a43e19893653cc 0x7d2656a717162dbe083adc731598205f04d892c5 0xdae386dc6e3e1552bd403d99b0e491c8d007e232

