ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E39EF37E24B2
|
Infrastructure Scan
ADDRESS: 0x0614f44cefa23ee5c55f0f8ed314a453447729d1
DEPLOYED: 2026-05-03 14:55:23
LAST_TX: 2026-05-03 15:55:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Hex dump completed. Entropy: 1.34 bit/byte. [SCAN] Running static analysis on JUMP instructions… [MEM] Garbage collector: 0.13ms since last run. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0x27. [TRACE] Program Counter (PC) synchronized at 4361. [VALID] Finalizing audit report for 0x0614f44cefa23ee5c55f0f8ed314a453447729d1. $line = str_replace(‘0x938fb2d966307eead182693f3a54ece79309ad53’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2119b1df27b03cffc15604cfaa265fcbad5d466a 0x47b336b17aa9a36c82c8e9d572d1a724b5d77476 0x1f4b366f4145a92978df4beeb6bde71bc652f034 0xbcf39b15490f193a63ed13adb88083dbf0b9517e 0x1e84f42aeed8a2c57b50b108992026024c3fed0f 0x02315e130e4cbe91a49d965ea363b6c829d287f8 0x8d93ea59015f99b46269c1b0161c2ff08542284c 0x4a8a7af29798d30e8e4b535213e251aed1ff8f4e 0xe9192327218caad3fa8216fae7219465bc141d8b 0x109e1af1fe1c06bb0590df4aca6a1b15ab93f34c 0x075cf3d545f56feff43a2c29a186045c9f819487 0x58a0d2006b8713f4d567789535a53fbd033a6c10 0xcad70483fb53aa151ba459026bb56892c4d39054 0x38e1acb18d94bda60d0455cb92ddb26b0c6a3ef7 0x4c68c07cfa86101663deaf464e4ac63168af345c 0xfde062fc5561fa287fa474b863ea79c352efed01 0xe82891794dea0513b4e04df88db4ae8784e37fff 0x3734b3024d6c34220e825405cfd57782e6927c4e 0x35ad0c3902803df4baf518f7bb4d863e6b1962a0 0xa0b33a41b748da663e0361f6114925941968ad21
