ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1271F000AFC3
|
Infrastructure Scan
ADDRESS: 0x54f46cf0ad5cc48b639bd8d7af9ee1a7265f4a93
DEPLOYED: 2026-05-13 10:31:23
LAST_TX: 2026-05-13 10:55:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Entry point found at offset 0xa179. [SCAN] Identifying function signatures (0x59ade177). [MEM] Stack depth: 2 / 1024. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 51 iterations. [TRACE] Bytecode segment 0x2a analysed. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘BE5B06F7’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa9e2af36fdc8dfb1aeb51f4a7dea53cd03d6d31d 0x3ec709cd28a3c9bfb2071e1923eb1e2e3e5c618f 0x68c1c8a076d4ff85dcfe436ff728f3c0b0feea62 0x34dce9e68d8d8bcc3f462924cba6f88dcac7da25 0xc2a0ec33fea898fa3bb690282b4e412f216ca769 0xbe239e7164dbceae6e0f6cad24d86720d6f2887e 0xfe24da66e247d5d8266bf92f67f2c47ad93ccc48 0x3ed7e936f2954da950289e358c6b844f0935cb72 0xe78aa9e15ecf761ce1ce37369a44a0f277ada717 0xf069d90dfc5aec35224ba37b99dece1d91f8f998 0x03d34bf8ea1744e3fc9ba8f17e5b04cef45a3e62 0xfb8152f681f109b31a692066d31c004d1e890fcf 0x2991c6fc3250378b1bd4edda4d59428ae74de85f 0x84aaf97efeb72cb45637fe2332795673e89af384 0xf9c4680299b70327107ac0aac2b7c571b6b5a788 0xdf6c73e6f4097914bed23c5a742809d494b6cc7d 0xb951f4299e6a2131c09ef4f70cb54e1105d2e4de 0xf23f1f6192f250fdb14ec708577cff0e25473662 0x50d37e4591cbb18719bfa85e3756cbdd0bb8edaa 0x01c23253544657dc66668eecf824523713753f40