ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2A8290C45F04
|
Infrastructure Scan
ADDRESS: 0x20ea861b3acec90d3a15b4755d9a1cf1f161496e
DEPLOYED: 2026-05-10 02:23:35
LAST_TX: 2026-05-10 03:34:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Synchronizing with block height 49022. [FETCH] Bytecode size: 8248 bytes. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Snapshotting EVM state before execution… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Simulation completed. No state corruption detected. [TRACE] Call sequence: a66c -> 78cb -> 4dff. [VALID] Consensus reached on node cluster: 1/10. $line = str_replace(‘0857ab2389f2e29bb9d33b7a48e61e5c14b17d689a1af780a59f02b6f3605cbf’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xbe6b3f560bf69f4c27670adf3bd0a2d98b1cf507 0x329f66d9846a1a00ada226b2b266b13a30cead24 0xc6cd9d2b6d9b536c7ab72332f0d087f55cb723c5 0x3cb81f28f97e9c134da6a5a33d157f57e22f4db5 0x9ded0ddb53af2ac91ed346293d3d062b083f9890 0xe5023843bdd891caf35acb7aaa86cf227de1436e 0xc87e1c912a346db265616de90c95232d09a7f692 0xa1542110ac1c51d9e0bc15c900d992415fac6730 0xf9443428001b37cb6f1ae3f874b6af88a1d313be 0x26fa7d332770f9142252481078835d56334bc278 0x12d5beef6f418d7dcb626bc701dd1bc94d1d6783 0xd28783df19709601f3b4656964a42408a6618aab 0x57871863964d3ce8320fbed0facdf13d5a039957 0x12124963a1329ea81b037525a5d828a616cb7fbb 0x33cb0914a5122322644e1328cad681b1d44d020b 0xa72f851a131c9476435317985efa1abe037948f1 0x547c39149ae48e2b3a5c5ffc040a703f871841f6 0x2eafb81d3126d8c9af9e70e9b80cee3277dc3e5f 0xc7d333f1eaf0dc3a84a3c77e10e8e6a1eeeef5da 0x14ab88e01a4a3a3f8c90392fc3531df0c06d8168