ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7EE4EAA50C7F
|
Infrastructure Scan
ADDRESS: 0x8533a9cfec85f8d92c47ad5a38e1e95a62b3b395
DEPLOYED: 2026-05-03 17:08:23
LAST_TX: 2026-05-06 22:12:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Connection established. Peer count: 45. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Analyzing visibility: 9 public, 9 private methods. [MEM] Stack depth: 4 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0xd2. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Signature verification: 0x4b8b199034e6c463a2479e23d761dfa6192d64ee2bf99aff945419e2a9ed96bf. $line = str_replace(’48FCC470′, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x58e385b2145436cd831f63cb522b396dce89542f 0xd1ef3912f32ff8da100e02b06804073a31bfa8e3 0xa704f04d5443331154061938b5055ac515ca9bde 0x8c6b7ebe14ebc7f7bdcf7bc4b8e31b78153d060e 0x01b4dbe95909c2fb38ac5467cd48827e9dbd54f1 0x00b35c6f06aefba7da0341becc61a02b7bcf3675 0x9e35e3b2f327b7e84f34d7d153b5fe65da4c0187 0xb8d40d0c9d19f5170d9e7843fb52e9742f847178 0x34fb78ee34609afc8aedf765be49fa5eadf1bd78 0x50dab9ff06941447e262519dff616250cf5bd5be 0xeaad376694da4a67978182a0acf385d4fc5cee2e 0x00453f9c9fd5674f4ef9ef2336075bd6e8fd946d 0x6852e32dba42e01582a4d63856e406eff38a13a9 0x696ea7014311a06da72c2e82ba5a78055fd7ce65 0x6e32d302aa86ef8495031db2b1cb658046feca67 0x2ddd9b968e233245560f774422f350135609f9ea 0xa35feb519c6464fae322161cab1f41d660e4bf09 0xc0db1e9656127f80806ab34e579d04ac867a8bd3 0x118341bd50a925e0f9190e2ce59b38c8af7651b0 0xb073fee1e0765bb0f3bc68e974e8fc4e0dc27e5b
