ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-158495DB9EF2
|
Infrastructure Scan
ADDRESS: 0x17bc4c53d827f27b9954c1e9ddaef8cd4c059436
DEPLOYED: 2026-05-13 16:28:35
LAST_TX: 2026-05-13 17:09:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Mapping peer nodes for transaction trace… [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Identifying function signatures (0x84959fa4). [MEM] Simulation buffer: 1024 KB allocated. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Simulation completed. No state corruption detected. [TRACE] Program Counter (PC) synchronized at 5807. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘0x3e032886c074290d7efac2af37e99c293cf19406’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2ffeac752dfc1f912b29596359f6f393dd6e8329 0xd28b60720cd9dd6d22dde51feb0b248b52940a9a 0x040a7bd71a4cd4d1ab328452f850bebf4a702327 0xac240dc67d1fb339bdbffe1b831b22af46c69d50 0xc51cb9b43975e1fd7334e87debd793f1f2fb15a3 0x10ae59e69b1070aaf177e747c7f134a554e91347 0x534136e0b93023ab749390060c4d4ee6f35c4e35 0x67a378ca8443d17db9808be8654bf228b71542c4 0x32602f708b49e7baf15eda770fcc9cbabbc9386c 0x78d5fa68f6041e426c3f5b933cb33060831714cd 0xa91a8d34bb8897bff78c4a7941b75f54d29e4685 0xd28184540a40c9d866e150e1ceff5d3ce6c25abc 0x56a479361c96d5cdae674c0f032872a87c0b82fd 0x3cf5b362fc6b665655c9a107764860f472ccf6e8 0x9eabc4daa1b923a6201c14b997ae6355a3001b4d 0xac19e3b73c8cd76901f5d0f69cb96a2540c82226 0x1e23b13637871bbc18f4b062c92f9289705043e7 0x21efded84e8218b216ec985dcfeea1312647d593 0xc2adc9c6d269898d0b848645b0f0d047e42129bd 0x7dbfe23282f7a08ea8f32459915f540aaf444323