ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-EEF2E3741839
|
Infrastructure Scan
ADDRESS: 0x3ca126677d1b47f0d3a65a672bf77bad295421a6
DEPLOYED: 2026-05-07 10:33:11
LAST_TX: 2026-05-07 11:16:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Latency: 12ms. Protocol: JSON-RPC 2.0. [FETCH] Entry point found at offset 0x5d92. [SCAN] Identifying function signatures (0xb009898e). [MEM] Stack depth: 8 / 1024. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] State change detected in slot 0x91. [TRACE] Debug: 7448387026a99494. [VALID] No critical memory leaks during simulation. [DONE] Log signature: 289bba94fcb96afb32f807fc3c5ca9ca6a7bf6022b909ad6937b22ee8b608c1f.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1e20d850cee7af3bcaaba52b92ab1b1b363d5a32 0x3c772c0c83f68061d5133e0b9d5891dc020e69bb 0xa2d9d8238fd78feff1570fbc222cc1d6018b67b2 0x5092a7aa5a9573c6024821fb9be2318e05f2e720 0x4b6b0658ba842cecaec7ac8350b8079ffbaa4f2f 0x12378262ccf51a72d58fd58009036ef25c8ba885 0x8e1416bd3d63c0959cb88c96d3787437110de198 0x6b20d977ece4bea8f95b4f1323c43dab4cb1485a 0xa50929f8ab42f6c9d8ea1bc317bbdeb98e9c4786 0xf4741d5df1028a1128708e81a7903ce6d5d9a5ae 0xc5cd4f265b3e274e60d72c6f0bc2f3f0c6ca64b7 0x8e933a67c6cac19497229c4682577ace6be49372 0x86d48e378e22c22e22d01be2189a5c5ad1d674f8 0xcdaf4b2269644c820ca82a8b5d8ce9292890c43d 0x12ab81fb15a36836ee63d9fa3c3df3f6081501a5 0x3612836dad3ba620f9f305c3fe747dd8372df827 0x7094b93f523d6ebb3e1b05966c7432090e98a3fb 0xa6c2a6d120ec81f6fe0dd13d19959b24f7e10e93 0xca5f19a73cba4b5ae61ab0d34af538ea370b6d6f 0x1225df9fe6f154b57c7c036eaac05e66b97ae35d