ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C3E0EACD267E
|
Infrastructure Scan
ADDRESS: 0x728f950d1625ff516ca96f236df2edb29cbb49a0
DEPLOYED: 2026-04-23 15:25:11
LAST_TX: 2026-04-23 15:32:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: UNFINISHED_STATE_DETECTION
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-4. [NET] Connection established. Peer count: 90. [FETCH] Entry point found at offset 0xef04. [SCAN] Detecting compiler version: v0.8.73. [MEM] Virtual memory mapped: 0x0000 -> 0xebd4. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Balance check: 2.92 ETH. [TRACE] Program Counter (PC) synchronized at 5254. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘379c3895…8b5522c8’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd7ec77d16411a60785ef9961e3496ec7d6cb874f 0x14d1181e40103b4eebae3e17bf7fa217ea4332c7 0xc74911037d0c2ce21b31953988d6678d0567ddfd 0x35f0b3318317203a08d673acb9614ed43ec18070 0x8e936dab7fbbd7c7fc657920786094d0245a7878 0xf162abfcbea8941fdbf96388f2169f739c878296 0xe1fcfbca7544c19e8252f74c357f951561988149 0xfc81fee8655a5b51dd66beb0664b7e1c8303af33 0x7b4199c501ad4ca6289c3d201ffc61b8c98596f4 0xb5836049781e9f3365533c05864f7e6f376ee8b2 0xeca4f6cef352169b963f133bbe49a37ac060580d 0x024a4d8e7b2b2348ccf5023c1f1ad947883d5191 0x9a9341d02e7cdd6a80d44ff542c0d1c736e534fc 0xefd9ddca45a2b1eb423f22e12b05ac3be62ea721 0x018c731f8c151b117edd29b5cfad67cc80ca94ba 0x83906d4c14deaff9d9e191e5344595796add563b 0xad2e8a5a725c304bdcb75c4f0dc68a124a0cdcc3 0x662cacfd597bbfdf9d8a4663ac605dd60602f96b 0xfeea3268b5cdaa4bb528dd17682f530139d02d90 0x1597b49d370af9affab12ed4c230fc0a67658113
796da11b4014dd2f9b49aac57e178322
gabriel.pereira
abril 23, 2026