ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3FE2A6873884
|
Infrastructure Scan
ADDRESS: 0x4ad862e1718ffaa2708ea4738a39ffda9966269c
DEPLOYED: 2026-04-25 04:25:35
LAST_TX: 2026-04-25 05:05:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Received 45 segments of contract data. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Virtual memory mapped: 0x0000 -> 0xd3e5. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Verifying ‘require’ statements integrity. [TRACE] Execution path: 90% coverage. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘6dd2df92…06cd404b’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8d28118cb52599df28c4a27aa2bb335bc03cc580 0x9a7348917155e8067389cc2f7e83f0efd2593917 0x8209815136b35f21b8c0f5aa2e2f915a73530df9 0xdb9a2916476bbb46ab46355a84b6b3cec4b88b1b 0x1a12bf7c340ecbfe9fcbe96e7b7c5b775ca29062 0x293d8862fc4c233c171a5ddf8759325ced2427ff 0x3bab8742aec1306378db7a383b1245f7866fdb6f 0x3df1dab812f823105fd8a2e3745717f15fe0d0b4 0x6a01fd63b136c94ae6400e69362b915930f35d66 0x4ecc8b383b6b6f4408c792659c8c12c9193ba7a9 0xfb477e4060141018e84bc0c23777a35ca72581ea 0x2d65358c3c1ee633388779245bd5fcd229915bf3 0x1ba5ccbc80ad8d66b7777e8242669764648a7692 0xc9b635fbdcd503db0b5f20f8268c43c9f95e6538 0x74710cb474b571b8b0cf989ef2ef9912ebdd5377 0x0cacdf7cc712c55f890c3e5da82094f11c4594f2 0xd7ec77d16411a60785ef9961e3496ec7d6cb874f 0x33eafe3dd4de753cbb129f84d37ec4cf2648c4d5 0x834e13fef1585c9ece568cabd92b28fa3738c310 0x2d6f7bf1fefa7ae09a3cb52734f4f10aac06e926
