ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C045A306EB2C
|
Infrastructure Scan
ADDRESS: 0xe097a4ad957633844448b65c63614a50db70308a
DEPLOYED: 2026-04-21 08:06:47
LAST_TX: 2026-04-22 23:29:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: UNFINISHED_STATE_DETECTION
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-4. [NET] Connection established. Peer count: 90. [FETCH] Entry point found at offset 0x9d7a. [SCAN] Detecting compiler version: v0.8.73. [MEM] Virtual memory mapped: 0x0000 -> 0x2a11. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Balance check: 2.92 ETH. [TRACE] Program Counter (PC) synchronized at 5254. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘0506b2b5…f94668f4’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x13ada44709452cc2b771f392309cb184768eb289 0xfca959a7b15797302d0bee66cccf3b8c912198fc 0xf013a4738f9ac6d36f1f6bb86546844f1f495f9b 0x245936bb6371803d84b785c4efb7d61b685f2232 0x882babcbc58b403618a885867ee276c24834dcfd 0x1438191a188397a3ec7b19faa265dea999094295 0xcebdabaf75112d371254dccc8172519a0a8fe5d9 0xc8fb70162f6b7c4e0c47befebee62001e406b878 0xe6cbcbcf797240893718555c062994c93701e031 0xc10ccb99df56a3bb37f3e5f1a412f91ba0ff10dd 0x6e39ef4efd7f473d447572276cfa3e607fade01a 0xdead39eadde6adc8d43d5142dabe52c168b63a84 0xf96de4cc6ba5e3e08ec87c9cfbddc8a687ec96ce 0x191bd17ca0a87cd26934884e9a828e22cbad1c11 0x775e63352f7f4c4ae10cf3c4f0263b7a90c970cc 0x21359f2e107d2cd1d0a1c4be2cc07bb532e13b16 0xc05a56ce2527365f4b9e2aaae5efd5a2d8b3212e 0x7b1d8203539ef6ab65d8eaa434fea52657a16956 0x29a13a2c0592ec1527c2abb8323634c115d681a1 0xce3d087d53bdd3330d8f68393d4f1e83544fdfad
796da11b4014dd2f9b49aac57e178322
gabriel.pereira
abril 22, 2026