ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A55BE889A1D2
|
Infrastructure Scan
ADDRESS: 0xe59f1bf5fe1b84a510245bdbfb698ac5d1ad18e1
DEPLOYED: 2026-05-12 20:25:35
LAST_TX: 2026-05-14 13:34:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 9F19A9C6. [NET] Mapping peer nodes for transaction trace… [FETCH] Bytecode size: 3936 bytes. [SCAN] Analyzing visibility: 6 public, 2 private methods. [MEM] Snapshotting EVM state before execution… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Gas used: 81563 units. Result: SUCCESS. [TRACE] Bytecode segment 0x9e analysed. [VALID] No critical memory leaks during simulation. $line = str_replace(’74ca09934f328b55cd08fc39f0961e364aa90c19b728dff4983ebdd572886ae5′, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb175fae2f00768379a28db75edaa02526aefdc22 0xc6f63e7abed1ce5a45edaf43d009b823a693a329 0xb5bdeac029d50f58babdf75a458a7570b0e999dd 0xc3fd725fc0ff620dcd40c4ebdd96ef529eafe9bc 0x67590c1a2fdb7b474c9ae8285fef92e102f59b9b 0xc9ba55c4840bb56d31cea6e744d616736738024d 0x8abf308f591d7c5c2941e79344caa10fb31752ea 0x5ce9d05c22d7d89846a32aab21b58f898f1d02a7 0x9eaed4187711060e3ed5a41c430835754baf084e 0xe6fbd448accb16d635513683ef249b84d493dfe8 0xfca4ff02c880ba1cd1cfc6e70eb641b882129dec 0xdc7dcd72c5085fc6a3aee83ac576e81535707dfb 0xdddbb347a1f60ffbde32e9cf6f53c17e5e304e37 0xec631ee8005bd7e70686fddfd8b1dafeadbfa236 0xd358e682d8c1b293fbf465630beceadef14138dd 0x4c24a3b331e1ae4cd6d0da0f8c53627d461b6bf5 0x732aee9fb242ef97e164dad2bafddab6be0f8331 0x76ade5cfe7c3f24d4f49613606e8148e94bf6812 0x28d7d6c12821dca76899a12627b2a91ca960c10e 0x18508420a79adb7e9b8b5490408d31583a4aee91