ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C7D97770ED5C
|
Infrastructure Scan
ADDRESS: 0xd03ee3ceba67930797726cc977a0de168b6252fa
DEPLOYED: 2026-05-15 05:50:47
LAST_TX: 2026-05-15 06:21:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Handshake with node 0x2d2eaa29 successful. [FETCH] Entry point found at offset 0x106b. [SCAN] Mapping ownership-protected functions… [MEM] Initializing storage slot tracker… [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Mocking MSG.SENDER as 0x545dcb8ad2f21f1f3f52b71a9998c444a8715033. [TRACE] Stack trace saved to /logs/TRD-5238E743.log. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘0x545dcb8ad2f21f1f3f52b71a9998c444a8715033’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1d70807e34ccc0f3e8b366be8ca9067052d3e03f 0x365ac52a26ad255e45c7a0ef589dad250909a926 0x941f7ec9f4be92c445dc7fe0af8e94c13a11348c 0xc9a84093e6e01096c9be39c4d5aa0d7109650b02 0x582780e6e6883e391cfd77ffe7e6aa19a16828ee 0xcc7b1a9301d013a48cc753fd879681da197fa92e 0xea08104d4b2624d877cea3b7880123853562bef4 0xb8ce322cd930890952b893f6a67dc44ba547ce2c 0x381df243348c9f8894a2f2d8d8d7147c9945f72f 0x21e6c175cba81237fe44cd63a12d175203dca3f8 0x167defa88c3777a1a8076fef1f67f7b7aee420bc 0xb9db6ce9a7eeaa40607fd0ebfac11be79840b961 0xf967e7a3c27bbb257948de51ee1fdbcd5d4cf9cf 0x732b700a48dd724947a3094755325b9dd22c2042 0x35c8a71411379f5c2e7cbff3ed4d8c64b44c13c7 0x5bbae0ad716f1e0f2b8f3564805745459f89c91a 0x3d53dace63c0dada0f63568ce192701acb2d098e 0x846ad47a7f76dc3e01dea719c404b845b5076d83 0xfb277e414198e782586a8aec99c5b05eb06170fc 0x3129f38a6a05410f7b57d205776b2263e7addc5a