ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8E288742F1F8
|
Infrastructure Scan
ADDRESS: 0x3a5eedc432b6fb0e5eedf206b63f7d9334989309
DEPLOYED: 2026-04-26 08:14:35
LAST_TX: 2026-04-27 19:14:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Entry point found at offset 0xfb15. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Balance check: 6.47 ETH. [TRACE] Execution path: 48% coverage. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘6ced995b…e861f3d7’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x867c4a1634d0809c2dcdd4c254edbed2ef7bc727 0x5a4a6322d3f6d005ba8d16f809a5d5825c515dbd 0xea885ec2f6d39824fd359b311eb7e101c2a5c843 0xc39a9a3f1192eddeb235e9174f3a765a407a846f 0x9d79c545a7666079f5bf960ea183b6991258b4a3 0xa4c9d6649bf38f66dc9d0283958992a732c20b22 0x4d9e1e2a41ad5d4e71d99be3728ab07ea4b1677c 0x4330d6e1877fced2c0b9e71e91e9084f49387d7e 0x0205f891f52918722b10dcb1af52258f10063058 0x320261f79b169684e0ba563e56ce587604619c3a 0x80195fa2ce6a572da64c02665ff105d3a718b0ff 0xd89b3a48c3f9d2913d60016067f6afca43b3b352 0x3066e1495024c2ff6b88bf729eeeef74c8c48a5f 0x0bc9588f38907ae6d52946d1e4184c00e217a935 0xda435b094243f3e3e1cdf83a40ee4047da1a371c 0x7e050631454a46be27a835e24a95dbddeb8ed03a 0x509455230fda6ff04cf4d4830733470eed9c6583 0x69bd375e2c102f4947d3f97400d1d89ad7bd76ea 0x8f498c8240e621f8050249d1c2f5f2aaee484ca0 0x9a0b734c62cc551f9c778d426c1996ec6f7593aa
