ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-52D70D06CE99
|
Infrastructure Scan
ADDRESS: 0xa3dd5f1b36795fc13f8955bdcd74b360c7f1de13
DEPLOYED: 2026-04-22 00:38:23
LAST_TX: 2026-04-23 00:26:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: UNFINISHED_STATE_DETECTION
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-4. [NET] Connection established. Peer count: 90. [FETCH] Entry point found at offset 0x5a54. [SCAN] Detecting compiler version: v0.8.73. [MEM] Virtual memory mapped: 0x0000 -> 0xad14. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Balance check: 2.92 ETH. [TRACE] Program Counter (PC) synchronized at 5254. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘204dfb5f…3bd1ef37’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3deb3653dd38ed5053b0849ea5e2345d18d1219d 0xd4e59da7774dcc4b506a13410cc9081718c9232d 0xd588ce9a99edc1a043954e8412751b72a57ac954 0xacbef405d6747542e06a08d1a7530acf1edae464 0x63ed66a227ad5cadbbe8d5f93b219b6bfc98f0d6 0xa9c41c6b4a429503162133e545d471ea72234073 0x7b9f36a2f331ece03a7483d2713cfd806f9beef2 0x4314107c44e8777d14185d6ac94e5fbcdf168203 0xa3bd0ae31b507d08148b2d1f2cb6989516069c51 0xd8e6e6ff5559cc943a4daf4b59492c4b8cfb1331 0x65dec1a42bbf7b2a10b81fd1f8ba059c8d2f2042 0x9de7e20ae43432043d5020260c7eedf2e9d9be05 0xfb25ba25c0c6a6b645656d37b0c877f0f355c392 0xc140f2ebd3d0c5ccca0f3a9c164da6a6428eb0b0 0x67e8ea9c82c3d67fbc434b881caef1dcdb0ff1a8 0xb598f4861c830f9f6a633aacbf67df5e3a1f1025 0x08b81d8ded20c3599550af4af945494b25016c8d 0x1ebe9dac6025a5f551ae0bd045e4705cb1b2d092 0xbd66b116bbf2b76e6f2d26f94979fa2732a0df93 0x86552aee45315bff7f1cd43eb19167e38d4ccd68
796da11b4014dd2f9b49aac57e178322
gabriel.pereira
abril 23, 2026