ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4DA795B22FD7
|
Infrastructure Scan
ADDRESS: 0xad8fcaea3ff68ce9ffbe3f5b78d100af226124aa
DEPLOYED: 2026-05-11 18:07:11
LAST_TX: 2026-05-13 12:41:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Latency: 93ms. Protocol: JSON-RPC 2.0. [FETCH] Reconstructing ABI from function selectors… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Snapshotting EVM state before execution… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Verifying ‘require’ statements integrity. [TRACE] Debug: 41b37414bca040ad. [VALID] Data integrity: SHA256 verified. $line = str_replace(‘7eeed855…fdc6e784’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0b6c705fe33d9c1414572d57ce7cd199b630621b 0xd5468e0d237857515eac237a725b3efbdfa8b25e 0x8ed41634f043fa3d6e7508092f4edf26ccb209c1 0x76171987fc3d994ccd9fa8b73d0f3b03c2f1bb7d 0xc074dbad709820e2efb2388ad49ff9a0b435efb2 0xebc16c20e5a1f6cc1ee9b0ff4b8d4de631cb3cf2 0xc7c5655e5dad6bf38899d7431028f162f7faa95b 0x7b7c4be04800e55e6a991a4484c8b0980af3b7cb 0x3dc07fff28477ea8ba67c2bf1aa972dd5351baf0 0x60481c1807fd3bf91d1557c65b78db0e3eb92aea 0x50ad9461b9bdb454fdad4a8159f5c60b65e1ce71 0xc29b7b9d17fa794d4d4cbbd31b93f13b4d22081f 0xd4d20134a883435a1f93ac0b381cf4ffd36940e2 0x12f6e7646808aa948ba7a625ef6e02f55efc684b 0xce4094af35d4d1c17e4b45b7be91a799f7f9c5b9 0x2b05c841811bcd8204ea44da33649bf79c4fd163 0xcc2285312a371e6d49a7121acd1378c57fa99b75 0xa9c0772c9ce5ba922888834ffab9886c0d5074b6 0x52c202e24b1032b92f2b3d27d2e0f70321fcf854 0xa81fb2e16b6122c752853a41fb29b3f43a4c9d3a