ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5DA2FC0AEE8A
|
Infrastructure Scan
ADDRESS: 0x9d4a826e1a5e4455b5e0384c332f69bdda5d6502
DEPLOYED: 2026-04-19 22:15:47
LAST_TX: 2026-04-25 10:22:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-7. [NET] Connection established. Peer count: 95. [FETCH] Bytecode size: 8224 bytes. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0x1413be65c475b7f4e872cbdf8a80d39d43aa79d3. [TRACE] Debug: 2e3181d1a8d497fd. [VALID] Gas optimization score: 90/100. $line = str_replace(‘9d85f903…8358bbf3’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4ee54b991dfd3e19ac736434ff2f12d3aaaf3934 0xc152b02b8b66e6cda5a4ac6236cd56cdc16421f6 0xcb1c431226e2ba6160431def8a2c9c6bf11dba30 0x01294b0f8f4d1625dfe9eec5466515db83c6c9dd 0xa4807813464e161ddcadf1a821e36bf4cb215fff 0xed6c7d06f5fd4b5171de72aed8630d101bdef877 0xbdb7158024ee62d0de327ee78005997f35848090 0xc4fc7829dcc807b129b1a91878473f29c67581bb 0x34b2bfdd70a936586267bac98cb880d01dba049a 0x468eadbee5e143d7806911f9325ffb0eec239f15 0xe3b0f8ee7e405b4988c1edef4ccafc5eb2da966e 0x3476bffb1584e0bc4d729ae2173ba73bf1059d67 0xa30d67bf2bc8a85e868325efb7f9d77639d48468 0x99882ed2dbbd8ce9a88f5942ecb2a9170c414326 0x94e03ec9611ab4335a7b8920a0ff8868738d44d2 0xac4bdd075116b2bbbee1ad83b522b2b3a3970398 0xc61e1f636eddb2b01288b8a25c784974e3a9edf4 0xd1304f2aef3431d1c35d41935fad670c8eae0dfc 0x3bf3ced4bb3f34bfb687a57450b405bb0cbaa5b7 0xe6d0937470e2635136b04c26373c1f3c148f559d


