ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E7FC9D8BBB68
|
Infrastructure Scan
ADDRESS: 0xc37686843a96349f6ac873f2d097954d2020dab6
DEPLOYED: 2026-04-23 08:12:23
LAST_TX: 2026-04-28 17:34:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Requesting storage slots for offset 0x00… [FETCH] Reconstructing ABI from function selectors… [SCAN] Analyzing visibility: 1 public, 9 private methods. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Verifying ‘require’ statements integrity. [TRACE] Bytecode segment 0x14 analysed. [VALID] No critical memory leaks during simulation. $line = str_replace(‘7249a3d29ba42415f7f380d5d6e32c3d8c1d3f7547cb886dde592aab934b0bb1’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xfeb5dece6582167dcd5556a872087cbc4b48e539 0x685f746bb1307f3e75e3193cec99b1cb399ff451 0x3f93aea9a893f86af666430e97314cdc2841b5e5 0x533c891c32bc1d508f19296774c3d6b13a4b9d0d 0x229bea4dcc67ab65700b057e99da10dd6eadddf0 0xbce9799278d330c22f169362d7fe7b31a19061ad 0x477ab9de535d875071a78acf435b279e8397fe42 0xe9b993f03a99e50b082ab0a57b26a52c0f1cb6db 0x3ab80144b685f8bea72e14b6d9f9508b25b99b81 0x7a878e2d6c0a2bd1ce31f9885d6de934ac7c55a4 0x9155c0ddd97eb234836b092218388b02f0fbbadc 0x85518bc4956cf1127032995276ed133ab57b2c76 0x62cd38b31717f6b7fe0876885ccd5cff4f6bdbbf 0x917c7f3ae83ec9389a399ba0b359345093d8336a 0x3002d823b2bc28dbd0ac93b162a72938acba6e78 0x5c40175bbfb95b127dca5eec9eaa2bce0c4f1efb 0xa173f65906b39036de201996eaf5ff0762ec1153 0x4bed64f4cebdc95939b4690f80c4ff884e42c153 0xbf7055cc9fc3baa707b3499770e6059d55f7f601 0x1ef8b4dbfdc98c5dbb439f25381cc962a0feba53