ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-48E8248EAB98
|
Infrastructure Scan
ADDRESS: 0x9ed578831ddf3246731ef74e992163631cd010b0
DEPLOYED: 2026-05-07 16:58:11
LAST_TX: 2026-05-07 21:24:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Pulling contract state from Alchemy RPC… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Analyzing visibility: 8 public, 5 private methods. [MEM] Tracking pointer 0x6768fe8c in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Gas used: 93349 units. Result: SUCCESS. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘E39339E8’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa4d7db525effaafee4eee5bd9fd1bfe260fdc3a1 0x9587bda288b1ce8438294400c8e7f778df32fcf1 0x1238b1234e4e9f8ce37a9207aa43c49b65062c45 0x8fb757a1a617bcfdad9e0f64a908e1e0c20d6739 0xe44fef129507fb07a064f47e72fff5ae16deed75 0xf3ce3459a75880df27265cd8d4e2de869c418783 0xa32608e873f9ddef944b24798db69d80bbb4d1ed 0x40a5736dbd350bed5e31579262c8868c7062a88b 0x83188a9edf5d3c0cab2b6748a4106381b2379fbe 0x10c80c2283e06ab6ad3eacd8d096494e22ee06f6 0x50593ae2e2d8b483080a64e00515983fe90f4959 0xb3d37e860abbe9523f2b65519bb281fb8b9b5be7 0x1bc81f397b4e0dcba35ed35ec6a79a1c948b89d1 0x7e0288f0b789a6dbd22327168adda939e9599260 0x8314ce2fe70c3b0592a36e8cbcc38fde3d803f1d 0xb42dbcc5f999e4a67c31578a4be9521b9e4f97ed 0x507412890d06c538c25e6eadde6f9b6c78e4ce0c 0x89442d02dbdaf26ca7c3a35c2f23ea693afae030 0x042ae268311c7c05b5b52c295c578be86b2fa3b4 0xcc1ffa66cc75f0640121db64605e5b80d7a720b4








