ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-BD7C5366F57A
|
Infrastructure Scan
ADDRESS: 0x6fbb456c4bf5a7347cb472b0f24151c25359de7e
DEPLOYED: 2026-05-10 05:09:11
LAST_TX: 2026-05-10 05:30:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Analyzing visibility: 8 public, 8 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0x8d3f. [VULN] Warning: IS_DEBUG_MODE found in storage slot 19. [SIM] Simulation completed. No state corruption detected. [TRACE] Program Counter (PC) synchronized at 2902. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘c36ff2e4…a4ed741b’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa5fb7e0959293761c4208bcf0c251a591762441c 0x0ab89588246b89608b256fd41e1463db064fca6c 0x9f5b73676c001de769d1237478cb6bcc8ebde737 0x81ecf8aad1453dbe88713f72654edf8c6d0eaaa0 0xeca9f87f3a5acd7cfc2ec723c8183bb71adaccb8 0xcbfafbb12eee66e0be8a792e426597dc140d56be 0xa15abf4f414c02d25ca39a8c37d3754f129c90d5 0xeb0a4d80a799b0aed842544fde544583efff2b71 0xf1ab92bb77606ae729e8d3fea3103dac04d07712 0x3dc039ba80577bbb321c26ba680c99a6c42e1990 0xafb7533d98c30b09722cb560ccbebb7df20a6dd6 0x299ff8e315c1482dd58dd35cea76d0c69a9e9a42 0x411449ce5256b9e07a4639cfa872967a211e635d 0x602982addc0bf5fbe5b7c768f275ed906280d584 0xc1c088c50633cb763b4fb071846fe22f84c0cc2e 0x846d00788ac90c2b46effee305342e64470cb8cb 0x0c2db9d251d3c01430539b4916a70a4a4c3de64a 0x99735e588d9d49d45cce1f4c1d7041dca0f3ce7e 0xed811aa7a20bcb592c2f29dacd2d8ea0f42a68b2 0x66586f58abc1f0b0338115fca68c56b6314714b4
