ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-46ACBED3BBE0
|
Infrastructure Scan
ADDRESS: 0x8f9def2bdefeb90978b1e42207e3a4829298607a
DEPLOYED: 2026-04-27 09:33:23
LAST_TX: 2026-05-02 10:37:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Hex dump completed. Entropy: 3.15 bit/byte. [SCAN] Identifying function signatures (0x25cd0e73). [MEM] Clearing temporary registers for deep-trace… [VULN] Warning: IS_DEBUG_MODE found in storage slot 85. [SIM] Mocking MSG.SENDER as 0x2907f922a111ae8ea0ba06f85e1e47d54e72659d. [TRACE] Bytecode segment 0xf5 analysed. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘5f92b401…5178ad7c’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf6e8e70d5fa2b1bb7b9daae9c85f4b9bf991d443 0x4cc13c979d4f31d9ca3b4fd8f3a9211006196489 0x6003db06bf202f76995b585aa83c16b6ea131cb6 0xed2c04166baf984cd5f6da1fb7f84cc02334a377 0x20acc0891486d58d6af2216882efd700e3444dec 0xa222192722b5f6b7a0cc438c785710068b30db6d 0x0a98fa2a33ffd009f3a26487510567de756dfa92 0x7ce0cfcd40335ad26a0f64994f9cef477ce78ed6 0x91ca43cddbfd5f8d4f328d148a34695b791d5c55 0x1d10f841fbe51454aa0eb428f26008751dbaa7a5 0xd6f8b75dc7546dc47c43421c089075f69dc1fa4b 0xec4cc55bfeacd473f564f676b67bc48d51631c67 0xaa24116bc4c441dc1c994f73744dc7cc1b2ee7a4 0xdd761b80c9f29bd200ba4c9d192fac7d505a56f0 0x2d483da1399c03862da82f19704f3ebee782f0c2 0xf8c0796b6500309f9b08163e33f16f2448254a29 0xe579363a80d3068c78f54d56b791c32c8ad52f1e 0x3f956523fb158b9a9899c43ad0f83f2fcd3069ff 0x40db134171f2a9855dbe4b211ddf2f5ec71d98fb 0xe2f4018c1798bf0f2049e685dfaf469d1051a5b9