ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B7B4B199A51A
|
Infrastructure Scan
ADDRESS: 0x4c3db57eeeffb13a17b9ab19e0074d27799845dc
DEPLOYED: 2026-05-13 15:44:47
LAST_TX: 2026-05-13 16:55:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 963B6417. [NET] Connection established. Peer count: 56. [FETCH] Entry point found at offset 0xcff1. [SCAN] Detecting compiler version: v0.8.83. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Balance check: 7.58 ETH. [TRACE] Execution path: 33% coverage. [VALID] Finalizing audit report for 0x4c3db57eeeffb13a17b9ab19e0074d27799845dc. $line = str_replace(‘963B6417’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0bc98d98038c916b431015e899a0755a89d338e2 0x6d78b42baac34f3947341c52cd84c1dba8c9741a 0x1ab9836aaa783442f7d1a976794d2791b0da6a2b 0x68fe78946714e00ffcee8ad4bf24e5a306f9f548 0x83e8871984d4831c6dbd773119ac39fa2cca4898 0xf07c5506b2a8365cb6a48be5dbfc97b2ee7b4ab5 0x0b543750c3f6eee197dce831571f1fafbe8eeb4a 0x25f1282e5b6721e259d10ffbd724df2328aa12d3 0x836729cf447324a8421b07f25208e90b1d8908d3 0x1b7fa8bde3e11417367c5bf90448919b2fb83a5f 0x52bb2a66423222f620b2e4d1158f6c391f7a1ae7 0x481cd98f721d5157054f468321722dad438b8267 0xdee58adabc1cc4fe7dc7fd10b3778fd2d2858977 0x665f16263543286fe3f1d954678b8c7fbc5ddd53 0xcaf7b01b45e03f345f3dc8f6ad0551623190a95d 0x05e8813a69949f6c3d8e8eed20a7306e3a01014f 0xf7a86cffae915b8592c65acd03e8994ba220c2bc 0x877191373fef04eb41d22c8e5f7bccd87fac7be8 0xfd22888ab881175762dffeb357a8b979e464621c 0x7f6111fdaf21d8b81b14068bc58dfa74233ab41c