ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8992C4F7F8A2
|
Infrastructure Scan
ADDRESS: 0x1e338291be05e49e14043ce7ee2b33502c48f796
DEPLOYED: 2026-05-09 19:33:47
LAST_TX: 2026-05-09 20:57:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Connection established. Peer count: 66. [FETCH] Metadata hash (IPFS): 9e534843…918c4a37… [SCAN] Running static analysis on JUMP instructions… [MEM] Clearing temporary registers for deep-trace… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0x3cb54fe547b820c177ea3e40664d6259abed2586. [TRACE] Program Counter (PC) synchronized at 2353. [VALID] No critical memory leaks during simulation. $line = str_replace(‘9e534843…918c4a37’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc16621645ccdcf96f545165f27a30a781e08e356 0x0a51e49a633270a40ccd45c85ecd2810bbdc9b88 0x3cfb97b10f7c4581aac365f12b9545fea074bf9e 0xd6f5ef6e3a0b9457936901feb37dcd7be5fa427e 0xb6ffcb4760581c64f5f1f3228d0ffd6ce2e40bf0 0xe2089585c12ca4638ef072236fff877e961b8f13 0x21658e3fe5c9f5fa9cde4a11e402cd196e01bef7 0x284dd7fb2810d5ed3f35e1619a2c25bcb7cfdb63 0xcb5a08aaf67cc4a2584db1da92130ab85006e824 0xa28b06f30e1dcb602b21823e2534cfc6f3727643 0x2d5102e68e1bf377964812f7276f5a93875af3bb 0xa3e920d71142d071a502eea20d219bff08933708 0xb0318ed282e461f73589a3ac1f8ce2518e35cd19 0x8e4f97d84a5e0674f558678e7101a529d9a66386 0x93723cb087ec5071fec79e4ed1ec43aa9af64078 0x096f8978c40f3a1bd16096bfcc129b9f1e079b84 0x062b4096e16eaee559ee62b43e4618d15e441562 0x027abcc71c2314740b66f19d947340ec288ddcd8 0x382606c20abf8dc9d73e8851cf190b0cb030cd05 0xf38cb4140b65bc0b65ca3243bf1da9ac608d24a7