ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6E5182E0FC9E
|
Infrastructure Scan
ADDRESS: 0xad8fcaea3ff68ce9ffbe3f5b78d100af226124aa
DEPLOYED: 2026-05-11 18:07:11
LAST_TX: 2026-05-11 21:30:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Mapping peer nodes for transaction trace… [FETCH] Reconstructing ABI from function selectors… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Tracking pointer 0xd614346c in memory heap. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 59 iterations. [TRACE] Debug: ecb704391c08dffd. [VALID] No critical memory leaks during simulation. $line = str_replace(’20C59F74′, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1654a1defb03d54f27aa00d0236886514c59304c 0xe6512da65c508b7d44e4d2c67a60d73e6af1e3cd 0xd83dc7bf08b3cc8d61801988e4f13e459107c05b 0xaae4a23bff417b0a26e3db280ad890005a4895e5 0xfc6e49c828f0b4f186d236630615f2565928509e 0x0354f96a2ebd236274626a56d487ce4a183996b3 0x23aa105e926d8c17ad650b34724566e935832967 0xca26d95c7a87570c2b9231b1d04a127544496237 0xbc1b8e7ab2a6985ce080cde43fe2ee632a60a34f 0xb481d8a0836530a6ed93cd27bb8ef6415d7bebee 0x8cb1760048dd095d3f855e9100cb674cbb08b1b6 0x74269a5556d79c1fd54301fb1315b55f8ad5f089 0xe702628b873676499e8f44af588105f568f5f60b 0x243598739fe76c00f8964f0e4082f54fdfc14b2f 0x34fa99b76795f9a4bf00267832b8142411567dfd 0xe077d21998542886e189a3999d8f83802fe2b3a0 0x28a4cdd9c76962da6bde1c167b1506a12068b0c5 0x00f8200729f416934448559a5020a93270059032 0x83e8871984d4831c6dbd773119ac39fa2cca4898 0x1ad2dcd03e949ba8f671f88457fd7426524bae66