ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4B3DAC5DF7CB
|
Infrastructure Scan
ADDRESS: 0xc69647d4843a7ff5bdb248970812a23f2089529f
DEPLOYED: 2026-04-21 13:49:35
LAST_TX: 2026-04-23 07:31:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: UNFINISHED_STATE_DETECTION
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-4. [NET] Connection established. Peer count: 90. [FETCH] Entry point found at offset 0x1f1e. [SCAN] Detecting compiler version: v0.8.73. [MEM] Virtual memory mapped: 0x0000 -> 0x8ac2. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Balance check: 2.92 ETH. [TRACE] Program Counter (PC) synchronized at 5254. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(’19c16eb4…7a5c1d99′, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x546afdc88a62898df50918db925435a8a311917d 0xdb52fcbe83a188e060b2562702feda90eca46b49 0xe08fc9c7609b4c5094f1bb3b5b795773ba8af4d7 0x8ec1e7b0c44c057cdba4ad0644a3e034f91f1675 0xf06fc2e5a66ffbefe5261b9289ff274a3bdde393 0x516bdd2fd693180b10c51b2b1a78531ee71dc587 0xacbef405d6747542e06a08d1a7530acf1edae464 0xfd167731dde599ed13993e216d375a5722d72c06 0x48b2cbe2ea3fbecf49404b72dc2dc8009d2de952 0xe951ddb8c41e0c22f1082e3256de9022edcc2ec7 0x585f482c93843486620fa80e058669604a6d1b30 0xa3888b7109fcb8d3a935b5da229be7c14af8fa7a 0x1c7a9e929c011821192a05b4e8db76c62e31219a 0x8db0eb5c40cff06fa3cbdb7010c7d063e91d7177 0xcf0066f5b155cbfeda78d1d01d245cb92a2c7c76 0x1ce956ca177121bb1a741191ec2041bf236ef8e2 0xc30b526a857af73de08ef87a4f592de68e7ceb75 0x9cabe855f973e44638ed7bad6ccd9738ace2aa42 0xa469308a56b2388bd1e89aada34a8ec80c8f3f12 0x69cb6b305f00432da08854be779a0da47413c384
796da11b4014dd2f9b49aac57e178322
gabriel.pereira
abril 23, 2026