ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C610E46AF261
|
Infrastructure Scan
ADDRESS: 0x19222eb4bb885ad990d8df2a2ad3f6e64cbebf00
DEPLOYED: 2026-04-23 20:40:23
LAST_TX: 2026-04-23 21:09:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-4. [NET] Connection established. Peer count: 90. [FETCH] Entry point found at offset 0x48f9. [SCAN] Detecting compiler version: v0.8.73. [MEM] Virtual memory mapped: 0x0000 -> 0x8dbb. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Balance check: 2.92 ETH. [TRACE] Program Counter (PC) synchronized at 5254. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘f412f6b3…63372a10’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xed4997ac7a0343532c0a2f2d9db5fceffadcff4d 0x96d82f6bbe9c2c6f4c5c6b4d255f0fef75003197 0xd1e65f7a9de6f7ba8888ed454e87317dfedb1422 0x38e953f0e073b7989fb0cb4f1434f3035252c465 0x4cd58edc1449cf54d70701141e251e7ac258d1f5 0x7f3d6d70abdb85d63b5d970b5a03292abe94b6ca 0x8cbc94da105d989830eb7135f6f2be9940fb57a2 0x95df2bee5d5b2aa40499366b695d9b6519f076dd 0x49cbaef55b22e93195bc4d7f8576ab9e4e63689e 0x17178489592e2d8cf1146bc43304e91f0719325c 0xba3fafb974e28206304ad8098a17cee9bbf36069 0x5f8e7d750e75b44747c058a204d8dea0d18fa5d3 0x41a5b05e863e594cc95e8cb2197edc0b23e6ee99 0x8e14d37b56b3d17e0f3abc3b36aa304868f3476b 0x164436a20059b77519fa0b49c65fd4cfc1027e59 0x96e26ad99420848d47fcfacede518a0906ca326a 0x5fc3d0caff59102536b49347655ff642c65bc9a4 0x420ee541be489fea590d8104139aac48b09deb0f 0x3476bffb1584e0bc4d729ae2173ba73bf1059d67 0xeabd652eeadf437c1ca8f5849b60720efbcca12e
