ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-82CAA064A5B7
|
Infrastructure Scan
ADDRESS: 0xc881cf13c553f88a57064235658366393f3858b4
DEPLOYED: 2026-05-08 22:52:23
LAST_TX: 2026-05-11 23:51:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-5. [NET] Connection established. Peer count: 51. [FETCH] Received 95 segments of contract data. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Tracking pointer 0x304b9d6c in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0xc5. [TRACE] Execution path: 19% coverage. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘bd7b83f1cf285dc0d934387e59cc07cb32361c7c06d233ee76f165dcf69c91fb’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd8f5ea2dc013b60127f8a2eac2d359e80427eaa3 0xfe4a5ca639717f9f0cca1d07da88b922c7acdc2a 0x22c1cf79e2efd6b766b363ebb513680fe60ed2dc 0xcf50361bc11ccd30fe7253e216c417cda378ae9b 0x5d7a0d9000038d2d6db3d86ce6e43986a79f1d38 0xedd1e775c4211e4f717d7e61c8b621b8208ea603 0x490b1e59870bb0c17ea7c994a65afc955e6bfb49 0xfe2c1460b99d94efc8aeedc60d25dfe9fc066a4a 0x5beafe09c75ae8e57221b86082c187fd7e011dc9 0x19287366bbbb027b971b3ffd95094c18e7045a02 0x6ea366d3f06d7422608d53f6077226c7ef3fda4d 0x26f1864ed84c5e8b4d76dd94de0b550070f1c9e2 0xf0d5c8e61079e8342d742a6648ee5aa53ed11285 0x733743826b7b27c2eeb71afa00f900b9558006f4 0x4e52f2972096c774c3e73b96b9b7b0223e68f422 0xc5cd599c19bb6e3285e8d9d6a5ae0ccd8c0d83ff 0xae7ba272b0a5fba7c16d9c4ac126c8d789b25faa 0xb32fcbcfb65b9208c5030311fe5f88e2e2408294 0xf0757fff1febbcec34d61fde5aff4bef45efafb2 0x03b1528e18a2408be0dbf897a53b5231f291c882