ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FCCE8DC5BBBD
|
Infrastructure Scan
ADDRESS: 0x17035c7632a5edcc64f630ddcb56df31fb594d85
DEPLOYED: 2026-04-27 01:26:23
LAST_TX: 2026-04-29 16:23:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Handshake with node 0x931693aa successful. [FETCH] Entry point found at offset 0x43f0. [SCAN] Detecting compiler version: v0.8.68. [MEM] Virtual memory mapped: 0x0000 -> 0xf5ca. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Testing edge case: Zero-address transfer… [TRACE] Stack trace saved to /logs/TRD-ADD32627.log. [VALID] Data integrity: SHA256 verified. $line = str_replace(‘229C3D58’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6a2046338b4a51d14676483561ed8d9b54978de1 0xe17a3ece040724432cb22e92f6d0ef37e539fe6a 0x68a2e989bef21466b1e3484cd98e2ae1eb4db865 0x9d8aa66f4814e11f43e00d116486394a2bc57166 0x7bd84f43f219027eb5447751b655251049ed74ef 0x4909e18e775c9c150e381be14a3d3459fc689356 0xe7faf5558796037f1f6c300884d3433e6a0aede5 0xe9192327218caad3fa8216fae7219465bc141d8b 0x1fa89cab2a47c8a868c8e02e09185219beadd4fb 0xe6e2f516be30b18de8195a61418f97714efea7ea 0x19222eb4bb885ad990d8df2a2ad3f6e64cbebf00 0x7709da3249031f3d8bb199fb3ea632ee24f43874 0x6f2b4a4a33bb21a131fa99e0fb8551c7928d2068 0x8af00ab2bcf8f1ec54a1f39b12990f375da1d434 0x30f681f402a5951ed2ff28ca1e5a9559b34573fe 0x49429a62a3254a4f7340da0612f4260bd9ef8a02 0x1fb67d150c1b66a4478c79accc84292a298e6f36 0xacd9f539319cb710e87227550e8d56313cb09667 0x65231a38eaf16b9a40797339f183426d6658e05f 0xccb71898029fd3b38752f9e0ed0ce430a4536e64