ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7C67D080CF32
|
Infrastructure Scan
ADDRESS: 0x5093291c16f67191714f54723da99169a160ee72
DEPLOYED: 2026-05-07 10:25:23
LAST_TX: 2026-05-07 16:18:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Handshake with node 0x4f611ae0 successful. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Snapshotting EVM state before execution… [VULN] Warning: IS_DEBUG_MODE found in storage slot 67. [SIM] Simulation completed. No state corruption detected. [TRACE] Call sequence: fe6b -> aeeb -> f03a. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘201E9F35’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2993ef58b70bb9c9cb076cd9ae3296c77355d444 0x81cc6ed0afb3176f705eaca2012953d00a8b8f94 0x50f0b08617f3a267a332d26bfb02dd025c0cdc0e 0x744435db433fafa37668c250416d162413df8505 0x9212a5368bb155c573a5b1a106d7011ee10f88e3 0xeb620164d0af2d5ee102a38db9b5edb9d75fcd76 0x005356745f10d80e3c0874b8c0ee7574b81763d5 0x498ce6f83dc3f1076e59696560389c92237590dc 0xc6c053b28e2656e627dae12fffc23d6688c4ea7a 0x1cc79f8cd395068229f676c0e2b8dd51be4147b9 0xb13ab4b489e111c7ec6c03d81b8d86cf08d6aa16 0xa6b2df5535d3b9aa15f53a264c9da2a1ebfadd68 0xbaf4c74da80df85f7d17174d01d3c8d52c3bc407 0xff71af68f333ec102286852011b405a69ad8a818 0xae5157834c2fbf0aada6bd0cfdecf8c7a22deda1 0xcbeb1d54470011da159bfdeebca67986e2ce4849 0xf76f85e3b854234f3517603a7c9ca27765612471 0x9deae75db00d53f14f5f3cf8b1866fb39444724c 0x97ed799c3aad030dd60477b022f7b46b7c54de91 0xa25c37952725a955c7f9ee03725aa00d75d55423