ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-045D06B4306D
|
Infrastructure Scan
ADDRESS: 0x598342adb23b1a3da2e3899e4e9ebbfc8ad65077
DEPLOYED: 2026-05-13 15:46:59
LAST_TX: 2026-05-13 16:29:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Mapping peer nodes for transaction trace… [FETCH] Received 42 segments of contract data. [SCAN] Detecting compiler version: v0.8.90. [MEM] Virtual memory mapped: 0x0000 -> 0x5278. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Reverting transaction at PC: 2261… [TRACE] Debug: 5a20116ecb712b66. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘0x3ba7b69e0c038a112b81f6e7b1247bb37f794d61’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xbbc3f1af9d7e68e375363777aeaa5bea558b1304 0xc84409fa1b40b8f7516c72085eedb4fea4f53dc3 0xe1c87f153d0cce936f7e71b40fa3b584ddf8e76d 0xd2d63501e1c67b9563a2f95f7d28ac929a8b0d4e 0x9bae4fa69ebce4856f938b0e48557ad4de3e5f4b 0x4b9e614e61c727d549ca482634b251f5c64e92df 0x9988e86c009cb2cf0f9c8e783dee155bca71169d 0x7333438d78c1a778e55ab0b03b9dc28309bf082a 0x2ea765381b4c066b16d71a09abbbd73cf68f2e83 0x1365c78f6a56a05786b044633ef28e31fccea205 0x6462df480151a449e6c843c8d512d40670ba3c89 0xabd0934538ce57ad81ef53d844ec8faab1399e72 0xc0b04f5e5e1bf7ba710a17fdf79bb4dd86ceec44 0x7b828f506629ab3e7e1f2446f3a9b01086ca3b05 0x8efad4680c92f12fc308b919513171a9d1b3efad 0xb65bcecb0ab057e0e4110e7c6b97e489fd45145b 0x99d0617471f75650659a2c9350eb44d49d9cd464 0x1149a7e57e5b9ca2ae7c7dde974ae6e2dcd4f9cb 0x87c3f82045d3a9ea9ea09da14b8399c4433f9672 0xde4e7e7b4af626c9a77356ab1c0c036b110f1e06