ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9D825AE91042
|
Infrastructure Scan
ADDRESS: 0x529410520aba0130cf0a5390c61e1cc924b2e7c4
DEPLOYED: 2026-05-09 14:51:11
LAST_TX: 2026-05-09 21:34:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Latency: 15ms. Protocol: JSON-RPC 2.0. [FETCH] Bytecode size: 5716 bytes. [SCAN] Detecting compiler version: v0.8.43. [MEM] Allocating stack frame for EVM simulation… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] State change detected in slot 0x0c. [TRACE] Bytecode segment 0x86 analysed. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘0xa020c274a618eccfcc74f98631af18f0bd38a83b’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xec57a233904909e406045449ffffdc174ac77e7a 0x68029b9e4bf87d5be4918eabe97890d6197c5f69 0xab5a0055e6bfdc7ae3f1a38a29f16bc9979fb783 0x81fe78adf044453c60752b6cab70f0bfa98dfe81 0xff21ddab0e21d5f7ace741a360eca64005bc65ea 0x9a7e0fcf5b10d839810c2625c4d7b27af66e848a 0xa58400d6c697d249897decc7821097030bd18e65 0xee99991e3f4a39fac27c102c839f10772e46dde0 0xdca8361b52583df0c8f519cd03356340eca43478 0xf5faade078b712fb68da5d9134d1f4944f53d794 0xaa523f4698f58e109faf908c4173f953dec85fde 0x4c0a44a1c0e1a2c82dad4fe03edb8b3cbf3781fc 0x832f5efa8239427cfb6d5a78e050e99c555c2132 0xd377997a6cf15e91782de032c78cb230a6347fed 0xa26938b7eb9f097e23e73af30c8f2ad6d06e3c6a 0xd648cff73153965f886406fef4301d7ecd720a27 0xea8b79b727a8d58d3e7467340c29c63235c5a81c 0x2d869fe8b4bf7095f6dd25523a3da03a89cedd8d 0xb76aa640651b310c6b986ff7ca80deda6d65999e 0x28beade1a0d9a02e63855a6da75a299c4478ecd5
0 comentário