ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-DF9E5C9BF41D
|
Infrastructure Scan
ADDRESS: 0x918c6f09acc244d39e8b199082c7d3f6ea402c7e
DEPLOYED: 2026-04-23 04:19:11
LAST_TX: 2026-04-23 05:01:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: UNFINISHED_STATE_DETECTION
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-4. [NET] Connection established. Peer count: 90. [FETCH] Entry point found at offset 0xe98c. [SCAN] Detecting compiler version: v0.8.73. [MEM] Virtual memory mapped: 0x0000 -> 0xe481. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Balance check: 2.92 ETH. [TRACE] Program Counter (PC) synchronized at 5254. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘2efe80fe…6bfcce09’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x497bebd4270eaae9c0db680e925890fbd9f42ee0 0xb10e35243a995e8d7bf651a397bc2ecc92e78ca0 0xc0f5de55697d3f96c07d19834232c5bb9b40a3de 0x8028ac7f34647d89413af4968f215d1fd8fc5ab0 0x29086205332e212bd9e783b2aeb475cab5e82912 0x5bb61d43e6579b0b3edca61f130ae12e3d2c4b93 0x51b5a0fb4d75a775b974c7edc0f897c501a5bee4 0xf7bc4284c7fae313c42436d2f2a28ba3463bbaeb 0x2c923f2d6a2cdbe5eae2686e950060a4c1ad1b9f 0xd1303f71aa8e4277f45dd666d0ff02390325bddd 0x4af47a7a6ffcde21ce87bc1a3a10beeb19029cc3 0x80e265935c31ad60309a6afe6b9e1bfc697b9ad9 0xfd65276b5d449ea747434cce6a5a32651c8d0e05 0x441d4c3124f97ee20200bb329931d6a6f1b3ea5a 0x63ed66a227ad5cadbbe8d5f93b219b6bfc98f0d6 0x88f59ac896a13e12310b9ff8f1eca57cf7f2bede 0xc03799b635c9328b8a2d596b1441e6a61fea3667 0xd3aed64fdadd4e0f13be3f40351c7c0d00b5e99b 0xb9f63e589d8c4c9b0505cea3327df94b8d75c30e 0x4472364a0ca7506bd988edd106b5e7146b13f4a5
796da11b4014dd2f9b49aac57e178322
gabriel.pereira
abril 23, 2026