ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-27AF7274A336
|
Infrastructure Scan
ADDRESS: 0x9c65d15a671d814ef7be25418fd46139e7366c07
DEPLOYED: 2026-05-07 17:06:35
LAST_TX: 2026-05-08 02:07:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Handshake with node 0x82dddb86 successful. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Snapshotting EVM state before execution… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 18 iterations. [TRACE] Return data: 0x9395773e… [VALID] Data integrity: SHA256 verified. $line = str_replace(‘0227813e…e1df5cd9’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0b0d90f94ce4099c93ed4d3e3fcb70a525de99dd 0x89d14bec7e16166baf3bf4ceaaa141b8f42d5512 0x3da52a608d09442de983f33af0dbd00f8830ea20 0x6e33614ae4ea1216f7655854ab59d90ca4b4cfe1 0x9cbb9d5c5e1338216dbbf99a54817a7c2f2a13be 0x0be06dc81b033eba9fadd52a93b9eaa045d59ade 0xe04c42d5da5cbd7448b5af08bba50662e1a3bcfb 0xdfe3646ded2cfc45742867b6d17919b6ea1e4e92 0xefb49fce1c3287d1ee0a38eccf540a641b1f3661 0xac54b43e4409a2422df56a69a5a7dd2bbfbdb8c8 0x18e37773e3ff058514037afdb778f2d85b54c1c1 0x1330beae5219ca07834ef715458f695e1bca0fa3 0xba69ddb919a169d61b5bee2c392d578950a151bb 0xdc750769e47f29569c8f7d154e061d4ad093b750 0xfa20fe33a091c46e39861767d5c45e643ff8ac85 0x1c1b6d420948d0f5e189c4977abb31e7cb565872 0x69bc3201ce41977de4b2b6d2ce84f0aedccaf3b8 0xf1cf78d8ec3d90337eedb1dfbad35cfcbab96b17 0xe12925e901a12aaa7c6f35078c180e825d527f90 0x7ae60d4bb4bf2b225d8f2d0daba5fdbb77024d89
