ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B9B19E1904C9
|
Infrastructure Scan
ADDRESS: 0xf79822c2331db455087b51b6c97e4064138bb635
DEPLOYED: 2026-05-09 05:56:47
LAST_TX: 2026-05-11 17:59:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Pulling contract state from Alchemy RPC… [FETCH] Metadata hash (IPFS): 708500bd…f270d3a6… [SCAN] Detecting compiler version: v0.8.41. [MEM] Garbage collector: 0.61ms since last run. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Verifying ‘require’ statements integrity. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘708500bd…f270d3a6’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe4e247cfc4b01b271e23daf818c163bde25bd883 0x940dfa5581a99dc9fbbe7d4c33535bf9dec05dab 0xde2e016344929e64ea1317e2f03beeb1fbdb3498 0x26eda5da62805aff83121a143d37bd680187c23a 0x3530902b9e4301ee6ab74265e2c4daf28c396872 0x465344d13460d9506466c685a87ff732280a6d49 0x1f2b1e2a8fe309f0c23cfd40196b62ba3f774f7b 0x017e202916dec5498767e8b9f43d889045ed7d08 0x99cccd194d7e7a3daf2c3617b68ee999b3aeadfe 0x46437c9726874d323f32597cd959fca02b8d6ca0 0xc7d333f1eaf0dc3a84a3c77e10e8e6a1eeeef5da 0x0576be143eec5c8727d37a58fc918a0b3cf00ce4 0x814ae8ddd7195ba9c63fdb949a95b1f263edd67d 0x1791527ebb628209acfbe3ee65fb3158a833060c 0xfb2818285b0720d00dca1f4c19cb8ac970d148c1 0xa2a4129496ace6762ea5eae1058dfb901a1e8046 0x12a6e78caee7569cce97fd4f1d6b1c5838607e4d 0x9a651b25cfdb119f6943effd6140692800df941e 0x7a9fdf36bf32700ea3f54a3c39ac575f726cea2a 0x4f46bb6948190edd091c3a4f47dc2946ae627369