ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6309F80DD6A2
|
Infrastructure Scan
ADDRESS: 0x739bd4662d145050ab9993fc615281c8495619a1
DEPLOYED: 2026-05-08 22:23:23
LAST_TX: 2026-05-08 23:01:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Synchronizing with block height 65902. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Virtual memory mapped: 0x0000 -> 0xa25d. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 86 iterations. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Consensus reached on node cluster: 9/10. $line = str_replace(’91F91202′, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2585128b6beefcef3c1c7c483a94ad39dfc1fbdf 0xf29e81e4a1ae5409e75e35b20bba768396cde4e2 0xfec77a3c34c4a11a87bcdb6813343d105b33f262 0x2e4725f2c1507329678ce4a9d88f22976233b753 0x0dc550f8140eba62bc945669f25bbfc0593fe387 0xa4939676761966d59acee5b47ae57d02ca717b5f 0x02c59ab72c040de56b2d968ec4e54eb50128bea7 0x77b700f01473032a10b24ca2f8754ff5ea5709e6 0x75be7e95745915fd0c1761b74f3f9650ad2d1118 0xda7dea42e04d1bba2ccf8a893361859fb3f21e6b 0x2d66e68dcadbc56b9218dc41578bedb69ec12fc3 0xc2acb9b0ef4aa5bc73ee37e0fb2a49c1086bde3b 0x1b1e9b2f4ea158d9d31dca778f7a27cde1f63d87 0x656c771a5ee64c59512e2cfa2da01720d790c7f8 0xc97b769cd0b9412e68392c18c8ceb1816ef14f47 0x7fb43659000b95bda0f2d2db5c1c4b3452dd9915 0x3718bf04d6d99f195aa0645f361131fcaac84600 0x173fe7d5d33e27729de552ab059b7acf6717055b 0x1706a3d6c7ca719a86e2924265309bd78dc65b3f 0xb26286d211fc1f0a9747d66603600684b816ce56