ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2A5AFC46AF56
|
Infrastructure Scan
ADDRESS: 0x65a01efb7b76f09d6782849d73cbecf4fba1bfac
DEPLOYED: 2026-04-21 15:14:59
LAST_TX: 2026-04-22 21:15:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Analyzing visibility: 3 public, 9 private methods. [MEM] Tracking pointer 0xb12a4f94 in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Simulation completed. No state corruption detected. [TRACE] Call sequence: c0f6 -> 3ed9 -> ea81. [VALID] No critical memory leaks during simulation. $line = str_replace(‘0x47651c8330b59ba31bf7665e79754eb9bded6e93’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcc60ca2044e9a3157cdebf0c6f0060fd7aa5b20a 0x37a88f52e243b19593c7a96a88491901c8787973 0xab4a50d0980d94d8a934727b4ff5b74607d144f8 0x1a663d0487bdd8bef1db45d7370e82787466892d 0xc10ccb99df56a3bb37f3e5f1a412f91ba0ff10dd 0x8fa62cbeef20f11aa7da1003c0255c4a1459d1a0 0xaf007a2372c85bae585109bbca8488fb02af8cce 0xc3e67b60bb9fce16d3c66975c5251db46243590c 0x7744d56e729288f8b039e3d6b139da0040256985 0xecb7eaf88c73899adb4a1dd4ff5d835ea93c7b77 0xe96835f8b8a0dac5eb6c68982d5c33310350d841 0x257ea5652423dd5551fad18438b35ef422ddc01c 0xa4c9d6649bf38f66dc9d0283958992a732c20b22 0x063c2f2805bb71f75a54823845b8bcf8f699f3cf 0x418fe109280620805c975b4f18c76b641c3538e1 0x591b226a905f039d4d5d6b18db7947b5f8ae1d24 0xbfba9a961ea52f26e2dc53024ba8e0079c78a410 0xd334e673751ec86f8a9aca27fce2d71fa017343e 0x463736b6fbdc5043bc13aeda5e79fc92dc6aa18d 0x8fbb724a2fca66e65c0bfdd226aff13520779233