ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5789E3C304DF
|
Infrastructure Scan
ADDRESS: 0xd1e6890f9ea8908b5f96141666bb105589c76e58
DEPLOYED: 2026-05-07 04:53:11
LAST_TX: 2026-05-07 07:13:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: DE53C067. [NET] Mapping peer nodes for transaction trace… [FETCH] Received 97 segments of contract data. [SCAN] Identifying function signatures (0x1657b7c1). [MEM] Simulation buffer: 1024 KB allocated. [VULN] Warning: IS_DEBUG_MODE found in storage slot 35. [SIM] Verifying ‘require’ statements integrity. [TRACE] Stack trace saved to /logs/TRD-F7A31566.log. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘054bbd32a785cffc37408d97f8c59e6a7e0bd5482829455b5d7a36d7f6880984’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9577878c5f5cae6216ae3f98e70b9730b5069580 0x25b157d1b9c12a4be1bffa00375695f13fde8d54 0x8bde1c2f3dbd18832efa8ff7c404689e7be61988 0x24b19bfba54af9d0622cb20ee26311535a4755fb 0xf6834b1976439afc9e38814c414b3cd921741c48 0x4da0890d37e76e26734c788634331df2a01301d3 0x51a6c6a9fc2c8d04d1693dcacd71ba9535b0628a 0x50b4552f18f0b3d79a7affab60d68b1da8276f56 0xb6cf7a1650f144cb2a5c23110012f64784089cc4 0x3dbcdaadbeae3f0bd3cc0854c6cfbb53de0bfc0f 0xcf196bf8c9004e9d1eeb8d7ae65d13460cd58331 0xb1b24d60d04ac090eac60f24c57b97f9f53e7a08 0x53873d3d9442b869b8c0947ee1d6b72744672eb2 0x876f26534791d2ae8e9c826968b77c51f101dc3b 0x61381121ae003351838de7720d488a624cd28e7e 0xe1fbee739266b8104f7ad9b7e9ec2859ceaa4200 0x8904a96fa5a37d3bdfb8c67b041995abc71dc4a3 0xa9b9d53013b4ac87c65d11c721edf79f9439d9f2 0xfbe0736ebf5668a604d73ba93a5ddbee9c10b0e5 0xdf52c78e9c433fe68f64b98643fa91f97fcd36d2







