ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7382107D2074
|
Infrastructure Scan
ADDRESS: 0xc0fec5716b6481d0a4002c9784c6b4eb28098877
DEPLOYED: 2026-05-06 10:31:35
LAST_TX: 2026-05-06 11:32:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Connection established. Peer count: 78. [FETCH] Received 96 segments of contract data. [SCAN] Identifying function signatures (0xaa6b9d4e). [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] State change detected in slot 0x35. [TRACE] Call sequence: e7e0 -> 388e -> d020. [VALID] No critical memory leaks during simulation. $line = str_replace(‘25434f7bf789811d5fbb5a6cdc94db76feae8da89286178bfa5813abbbca96b3’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6d719f6bfa466a44c55364f53b3b859daa47804f 0xfd73887ec6798aa51b70e0384da1837744ebf37a 0x170145fdbb7f29774e7c843fb86754fa70a85082 0x177b84726b0b0703e5b92848a4b4c8fd540a727f 0x8e60aef2708069cd4c347b00c5a3280d604fd9ab 0x582d258c3eb3505b4b584b0a723d047247241882 0xb89955a186e80c60f922d40d050e4535c03b69d7 0x7568f30154981ef5f37779d0fc7a4621f0304032 0x9888f75eb4010eb3e7edd4275adc981acb46f414 0x4b258ca4a30822a23e2b1bf8835c21f6f0b127f0 0x920abb09be0abeb9140fb0c69a7cd523b65d2aa0 0x35eca3b6bd483adbf97a4e066aa179102fa20563 0x73a7fe39d052323a0e247ff0a388b867080a1d60 0xcc031cce846ba4fc9de4723bb8e16ebae00a1e8f 0x6e0cee78d2e9a112854360c618cdaf9599783108 0x0581e862d416d299fed6ca9fb8fdc3fa90f84efd 0x6c8568306a2f2044b1bbd80b00d01fd5178f606e 0x521e4fcbe4421177d60bfdf5efdc0421962722be 0x81517bd3c2e7dcf9264551a8e44fa157e1d60362 0x6e126d702cfa0050ddbae0c2015619d73d2a944e