ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6F7A541E3B46
|
Infrastructure Scan
ADDRESS: 0x5923873c729c875ab1f3cf404b6c23723076e4db
DEPLOYED: 2026-04-24 09:58:59
LAST_TX: 2026-04-30 21:29:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-1. [NET] Mapping peer nodes for transaction trace… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Identifying function signatures (0x8d326f0b). [MEM] Virtual memory mapped: 0x0000 -> 0x0d6d. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] State change detected in slot 0xa2. [TRACE] Bytecode segment 0x4d analysed. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘0xee2f7d02e1526e6eb6df8d4b3a505fe69e9bbca5’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1733a3a7086402f6f641811828e5583a018559bd 0x12c332de0656565699a4bda674777707e9c230a6 0x39f6c6d0735a18039b93e8e2e2b238eb2005349d 0xec738772f66bb85f078814ec7971e1d2c36b0ca8 0xa51936baea4069ada5b690bb49c672dee85e70f1 0xee749194f70f01fb14033e32ae3edcde5a28d46e 0xaca38786af8172d59311f2da2fbe1d3468708dca 0xe3f59c5fc34af9120b5ae8bd4760282b7c5cb400 0xc99d6778be60f095f2f24283771ffead94ebd53d 0xfc0c88029b94517224a3641f9f5878f5ee003c48 0x695ee5651cc459af44ad104c538ced1126926f65 0x7ec5bbcb55d2d24cd45d51c057219054bbb7800f 0x1f2fd80c45911c52e92da95f2bc68bb6a94aaa2a 0x404b7b458da55e38d790b1596e77f9d547273205 0x0690c557f3872fa4c166b8e42280ad2efaccfc9d 0xee1274fe43e968c2b63abb5595ecba31838a6d9d 0x558c88e750083468e6ecec2251cc3fe3ef7d74bb 0x905a9d30cfe5b2cc46dcfff6b3d6d9b7dc944fc6 0x1aa257f214d7c2881612b97edeac7ec4bf39e6d0 0xe9733fea9cfdfff886221c0105515ed3e4f64feb