ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-61787D726D62
|
Infrastructure Scan
ADDRESS: 0xcb65f5667be84ff76b1a83b205ade8c2c5487d5d
DEPLOYED: 2026-05-02 05:16:35
LAST_TX: 2026-05-02 05:52:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Requesting storage slots for offset 0x00… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Running static analysis on JUMP instructions… [MEM] Snapshotting EVM state before execution… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Simulation completed. No state corruption detected. [TRACE] Execution path: 53% coverage. [VALID] No critical memory leaks during simulation. $line = str_replace(‘d3b0fda7…848290dd’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xadc40a10a794968ffb51e834278d3ff865455a0d 0x966a0ee19c48931987076991f1e556b91893f9cc 0x9bceffac2de63b79bac1cc711d4e7dd9520874dc 0x0ac9dc40ae27a6618598ea2f9b71746d91f3301d 0x3a8a7580e0948ddcb55ccd05ce3ed6b87e810340 0x1fbd282903996525362fa12d4b59b451c46292d4 0x4d9cafb7ede9cc00e845f268b6d1f865cee5c65a 0x431ab79ee8ef41c3bd6551f5f847bcf825305452 0x46c2aaccff8c575809cc1f8c627ae62d9ced192e 0xfa92562dfd9484729e83b1d730fb81176b38b78b 0x57a12a2369e811aa5bf0ee2368c956f08d11b322 0xaaf9b2ab3cb67ddde23ed75ab598266af661e136 0x27fd785f5767e3443d3a726d9715f64956539a71 0x8ed676c5adfd6894dd74cc608faeeda8cec55209 0x71fcb23b5b68410637436347ca4fc97b7bd66bca 0x4ce9ec81eafa1b01b5d29a559f485dacfe383e1f 0xf2f73cc7aca1a2614edc8b5cf7037d6878322e8a 0x811f39e4fb7e8a1bc37ac39de4f40c3193e87928 0x64a896a2c5132752f69a12e227c99f334b10dc34 0xd14f5d4582fa0a9468627a4e19b6e4877576889c