ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-0B3E9E8F8849
|
Infrastructure Scan
ADDRESS: 0x64cec1b31444dc287eecc722598f3282a4d17e76
DEPLOYED: 2026-05-14 15:42:35
LAST_TX: 2026-05-14 16:20:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 85. [FETCH] Entry point found at offset 0x3242. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Verifying ‘require’ statements integrity. [TRACE] Return data: 0x1000b5a4… [VALID] Generating cryptographic proof of scan… $line = str_replace(‘7970b5722239d37047b00f889bc42cf4f5237b6bf0809826a60bcd3d40889790’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x53c38c952f7cf2088e40425840bb06da2e8c3c02 0xa819bf7d73f8ec1a6e6501c1f3d28a8f59b21c34 0x32c0f4de274a15350e6ffffa2be982bb7f17f088 0xca5abfdf0b7e787d557ebcefb02f6a4920f662ac 0x8f2b6a3959d262aba04fd00ae31f7d966c847075 0x6e3c1fb4bd2d6938b4da9b3cedd0d14894040dd4 0xd7bfe70991a683511bf7f5efabdde8b4692fd5cb 0x88de1b9bcf139bd3e69fe951b3b849832973a2e9 0xc8194f0b252720979644495977a21aabebafa2bb 0x48964ac3a4e98f2b2345261ea125e545252fd8ad 0xa7338ff46bce45f8c8b97bf8a99e1044dbc6699d 0x4827b6dc48e33e6467fc31858784db2074587258 0xa416ac560f74b57d19ad619b11c0cc0ea53ea8af 0xebc16c20e5a1f6cc1ee9b0ff4b8d4de631cb3cf2 0x0654750a6012bd42e06a0f1141153dc8c60f7fb1 0x53fc7fe7dc28592282e8054fb1c4350959315893 0xe78c32fd694f6517ce0bbf37e7e59e1fa5c657d7 0x5e30bcf428b1ece75ea6a9d6176cadbabb11cd06 0x7753a75128858afac18291003f184d85217c36b6 0x413228e558eab6fed49384febb36f11aa3d94acd