ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-229286ED3441
|
Infrastructure Scan
ADDRESS: 0xb87f8e976bf85ae81eebe6eb03d165cd4f1f909a
DEPLOYED: 2026-05-13 18:48:11
LAST_TX: 2026-05-13 19:48:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Handshake with node 0x4b40510d successful. [FETCH] Bytecode size: 5267 bytes. [SCAN] Mapping internal logic flow and branching. [MEM] Virtual memory mapped: 0x0000 -> 0x1dc6. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Verifying ‘require’ statements integrity. [TRACE] Program Counter (PC) synchronized at 8701. [VALID] No critical memory leaks during simulation. $line = str_replace(‘6e9f2a3f…c0e817a5’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xce1ccb6659dd74e182a14128c364e0973270c86a 0xb6bf7e810f86c50a425947deca9eafd41c468c33 0xfc4eb0abdd4390b390fff29ab1f9a2b57cadc2a5 0x2e74fd3117584d749e4003a339cdbdda67cd2651 0x9dd08ebf83bcdde6cb9f802d4df4cd7ba027bd2e 0x9917f00656c8693a68e759c29b1fdd878cbb0ec4 0x016b644499b693b2c16898f24e81a24a364e0e38 0x3e1c143c5211c479ed5610b23ff678392a0823c3 0x97a2e897b27180965b3622405d97443414f744c4 0x8d53174b4b621ad3b385535d41a821181fd9e5fa 0x0c6a086d1533c03061cc9a24484c1673500dcd62 0x2088a93a84057fa88ae0db4f722abfa28e4c2451 0x0c6d2a9c53b655ef63709f7354652508719aeae0 0xbb1067df24abc548a2c7f4f9bbed40f63290ba99 0x8073a05ad49a87c57cd12f26875fc28e5bf543ab 0xb8523b72eec2838b52cac9bb1c53a91cf565c9aa 0x8f46d1728bc12bc4578e4a952c8c5e223624ebfb 0x98b8ee1e66022c4ef02a9931b982054da161a6d3 0x4107f79c779f334f8eed1b59eead0c77d2097cd2 0x72dbda7c21f1b373158206bf023bd008fc77babc