ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-016C40C84DBA
|
Infrastructure Scan
ADDRESS: 0xc979ae5a8551e27eb08f520f3d936292d97e33c9
DEPLOYED: 2026-05-16 11:02:11
LAST_TX: 2026-05-16 11:21:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Handshake with node 0x3c5bb3c5 successful. [FETCH] Metadata hash (IPFS): 1d7a324b…4a1d33e3… [SCAN] Identifying function signatures (0x505ec2f3). [MEM] Stack depth: 8 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Verifying ‘require’ statements integrity. [TRACE] Bytecode segment 0xc0 analysed. [VALID] Gas optimization score: 45/100. $line = str_replace(‘0x7211ae94a78cb951ea4c732db1179fadac0e3e7f’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xdfe5e7f2c926dbccfc9d68137a3718762e84c598 0xcd6f22fcd0e02bcac83455c8ba8ebd1ae4581935 0xfedca6149465aff7d20067732017dc0fb3ec0569 0xb682c79dbfb5a9da074f212299c0fc8731e8ff19 0xa78c4d1be439358e26918c4550f86bc2ca6c0222 0x7bad7f2675c7740fb28c40b8d0444368bc640f38 0x775ca33b5a326020b394f175823e73b80dd7970b 0x0b9538bd2f18836be94958bd5571021b9bbfda80 0xd6d52adc05e981800723e62bbde012ba3045bff9 0x64cb458a595cec6c3339609c470fc97607e96217 0xfde394e093c6091dd5a2fa8b2bd2d5e262284b1d 0x97e2c388b004c134e53081278459e98ed7f8d1a7 0xfeaf3dcaccabb91a7a72fc8c42973fb67582dd7a 0xf97d8d54d89ae30c3ad4fd2189d1652d0e7cbd4f 0x34fe3c9b37a511b240562b0d2efb2b1c35aecd29 0x34b9c9a7b716c396b43d4ab024cbb5e90acc15f6 0x23bafa1863acaacf57be2c9c501a512fc3b6008b 0xa626ae844aaf91e9b299fa55270d1dceb82b9300 0x1cfb6bcf5a2e31d03d7a882fb40d18ce0bcf61bf 0xca95ace66f68e911f03e55da64a199025187c411