ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-849AF908E1D4
|
Infrastructure Scan
ADDRESS: 0x3e5bb2a724dbe9a6afe04ae7581639367693f51c
DEPLOYED: 2026-05-01 08:00:59
LAST_TX: 2026-05-02 10:50:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Synchronizing with block height 24170. [FETCH] Entry point found at offset 0x5d50. [SCAN] Running static analysis on JUMP instructions… [MEM] Garbage collector: 0.73ms since last run. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Verifying ‘require’ statements integrity. [TRACE] Execution path: 93% coverage. [VALID] Signature verification: 0x2a17edd6341d4c7a34501ae01533bbf682a5b427572606b0004acab2214dcfc5. $line = str_replace(‘592C37CF’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7a44c1ddf045acbaef3629597632c48d9dd71224 0xa5e7ab5f3804e9befd681fc3d690bb49781cb5a0 0x26ffce10bfb995b5751d0320c78f60bc8d427099 0x1bb9756886aa27c88cbb787810a2bfc6d34439f6 0x92f3495fb4dc0f00a7d170965b061a0aa5a4b39a 0xce874db55c53662f30f990e0aa7079a2fa24b0ac 0x65c7f332516a80c044fc7f27362a49deb0ad1b23 0x4ad89cc3865ed3dc4f8dd727e372ffce9098f3a7 0x3ccbd03be0be86410fc99830133f31762619351e 0x874af6ef6479dc6a834d870364103d54cb8bd0ea 0x1dbf082de90fd7b258a1f4b42e9135252d87367c 0x46e058c1cfc96228a16160156b5b6f8c92eb7abe 0xe2d7b25d7d55f6f88215f87128e4c27524b55028 0xcaec444cbaa81ab5ae1555542b0e09be37c1fe50 0x5bdd820d85fc7ef8da733832d27741f6915172aa 0xabb9efa1c0f8ceaa080c2c6884098b7e0f3689ea 0x0c857067b75ef8c9ca692f1bf7ad48070b5ca378 0xfcbfee883cf54d620c48d2b6725397f7c8de8eec 0x8cf199c8619fd0dab211e04d73a862d7819a6b1f 0x67f961141c6b94dbe6e28febdf1f584818eb1df2