ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-65B10CECF2AE
|
Infrastructure Scan
ADDRESS: 0x7327f928886091933be2ccc4a31b5f64c6fd106f
DEPLOYED: 2026-05-13 19:38:47
LAST_TX: 2026-05-13 20:56:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Handshake with node 0xb61ddc78 successful. [FETCH] Warning: No source code verified on Etherscan. [SCAN] Identifying function signatures (0x13dacd99). [MEM] Virtual memory mapped: 0x0000 -> 0xa5b6. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0xb45fc27f64fbe21d4c3e32fb26deb6daf3b1614d. [TRACE] Program Counter (PC) synchronized at 4962. [VALID] Data integrity: SHA256 verified. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4016cad1992d60989e780b1d7e929f921c91e068 0x12d5235e50b56c4b05642b00e7ad7aef07037158 0x56f7aa35d075e5a7d45c17fa25c2e7ac958db3af 0x655955b821f545467e7f580bc7e7f44515c6c686 0x292b8310661f37309702c8d146109a7ad311d14a 0x7d155a2dc7459b3c9da3abe48af8499aef276f5f 0x2ce087ee8e33703cad61a0066289816d2064d282 0xf232d7d7b552b3b981fe91b13f715b3c1f075a13 0x62b0851bee5fdb48bdccb17d45fc8d7a624e17c6 0xc39ba47fecc6199391a53fc43ce52a94470b6339 0xa7122c326a8b9cf133496f907d70d68d4e2fdd02 0x86d9438fbd49eba184e71dcf1f280808e9560d7f 0xeeffcd569f60d5c848a5f1f16b91f42aae982fc4 0xf7b09ae0baa696f7951a3ad5c162a5de803ae7a5 0xb783830ef5d89235ca157d46ba1fa0115a457a81 0x2217f18fe252b7b3efe26cb11a2eed36d6966578 0x5c0179532dd7d5d19d5ffebc053bb2d26a065fa9 0x8294805662ef896eabdc5312a8f19e4b8e52015c 0x5aa51198f1e3493286cc74ef29d25f08b9ca9420 0xd2aff8394c13f23ff93ba7486f5ee9fe4aa8114c