ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8573D2807055
|
Infrastructure Scan
ADDRESS: 0x0e7e893ff4ba5304103688280b26c48e75f1cf81
DEPLOYED: 2026-05-14 16:16:35
LAST_TX: 2026-05-14 16:50:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Entry point found at offset 0x881a. [SCAN] Analyzing visibility: 1 public, 3 private methods. [MEM] Tracking pointer 0xb3797c58 in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0x3e. [TRACE] Return data: 0x8966d48a… [VALID] Signature verification: 0xe27fbefc9fb915fc9c1f6117220595469ad4045ee945e4e34b63798d3f1ab12f. $line = str_replace(‘8FF56438’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x207e2d9321cbda2d5a9d84e232a5eced7e449584 0xc8ec35617dcf36b9544bcfb7df314514d73de530 0xd13e5c89f5d7eaf2895ca5ed39f4498aab867dd2 0xa28c70f92a1b2513edcddd29c2e5195a4b785ab2 0x6fb026c92fa381e22b2b33dc7c1c6621d2f5ab45 0xa1ca92697940230f6ea0ee8700c3dbf3ec2dbc8c 0x4346ec9b39fdb9e05751c50e5250327df7c38fc0 0x0f6645fecabc7a5053d690dcf785c55ce4ea1675 0x221b24e0d92bdfdfba04d3f3b23a96059d9b8762 0xcb266b3696755998916a4426683dd9a712460389 0x5bcf9d80c8dd0dc9b04362b0f201b2dd2b6896c9 0xc764d644b13ab8b67641e558ad6ab8b890636c99 0x27fa7a2636885647ba8f3586a166ff53ae092da2 0x61441cd83a4cacb868c0db911763c5d04eb5aaef 0x925bde9cbcdc12358cc641a53aead297ddeeadbb 0xe146d95f9591ae02ce4189a06a62ee3c38ba6376 0x9683abb6bfbe37d398c2c1c8aa059ddfba974750 0x0cae9a9ac600ac8e7071d8fc05352d1def01e886 0xb95de32e431885863a0367e5088b810932da11e8 0x3339d6d84fddaa4a717c33016ad157e9bdcdb6ae