ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-41677CC422E0
|
Infrastructure Scan
ADDRESS: 0x37248f8ed68f63da0c80878b0a416b924ad585fd
DEPLOYED: 2026-05-15 10:24:59
LAST_TX: 2026-05-15 11:00:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connection established. Peer count: 86. [FETCH] Reconstructing ABI from function selectors… [SCAN] Detecting compiler version: v0.8.41. [MEM] Snapshotting EVM state before execution… [VULN] Checking ‘Integer Overflow’ in arithmetic ops. [SIM] Fuzzing input data for 61 iterations. [TRACE] Bytecode segment 0xd9 analysed. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘0xa0c740b19e82329eb00db495ee0ff8795d81d966’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd7fdc5b936b771f6f2ea6430910eb2a6267b4638 0x71ed55d08a70a9a14a7ebe37b89123839055199b 0x7f300cfe0002ad99963da8ab5a195e2a2dc1fa8d 0xb3b2c036309b087f3552976c5130970f7e59479a 0x4875a4a4786d59410f4a5cb88b059d83ebe62338 0xbc0b167100e6541d06ca7ca41b3df6ec0fc6e7e8 0xfedfc73bf26d72566285c0a94d74406d9baa06d7 0x6db1ca59405a05cf5052fac2376cb327bf3b31f2 0xb15aaabe91d82a1c488eb30ada171683ad94e5ae 0xf04348050acdc8fb14f31cb0893437b8085a7c8e 0x7b8749b3ab066eaab29d73704662c9f3b7f558ec 0x471c99dddf4d547d49e53fee6344f161b645b294 0x576d3bec47e1673aec8676dcef49fea49b372f50 0x1750e17e0894e1704e1facd67bea88f2fb5c78fd 0xe0ad30adb0ea7e2cdce9e26e83ffc4baeb104b7a 0x5851f77be44a5c0f7b8713c9089931b1dd4d3523 0x1a6952ea4a18232003f62fd365f27420af893fd3 0x37a18360c58d0b4229fc1e6c7d43b0bc7c0d296e 0xcbcd58d0ec732ac63e5920f5fcf8fea1eec19f36 0x18ad881a1ddcdaa1f2b6f1c68070564dd14a592a