ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-11664F8C22EE
|
Infrastructure Scan
ADDRESS: 0xc9cb30675125d81bb508942cffd13d864deb8563
DEPLOYED: 2026-05-13 05:58:59
LAST_TX: 2026-05-13 12:41:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Latency: 58ms. Protocol: JSON-RPC 2.0. [FETCH] Hex dump completed. Entropy: 3.40 bit/byte. [SCAN] Mapping internal logic flow and branching. [MEM] Initializing storage slot tracker… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0x1e. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘0xbc864f251a2ec67e9244595f86609c38ab96a2e5’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2346ef273f06c47144626887635d38258b20ea2d 0xdf7772cf19322d406f8351dfffc4e13cc1bca378 0x6f2760aaa989aae9d85733c104219b11b8523cdd 0x258ffe22cde3d9c52faa0276cc7e0baa6ad3966f 0x24124d8a4e37898e1e8d91450c43cff1c5e4c1ef 0x78d5fa68f6041e426c3f5b933cb33060831714cd 0xba1b4bc55c26328147b9b552a7c7b72797818270 0xe2342b4a0eb22d6366d930e5a170855713c38166 0xe2a7c08d9f2e251fc6d2eea43f660e8e0b6dfafe 0x95d2b263ae3c2c0e20030db47cc58265e2dd8632 0xaf75477057dd71713fd27477ef84bfaf03237987 0xcf06a4a021ec4d3764ac4172cdfa71d6e6935612 0xfe5ab8e23e0e9a7fe61f92d686e7594625c1752e 0x06e5b1d343b3eda49df160d0bab320de55859ae3 0xc0ab80eb5d7eca2615e6cffd0dd5c80a311c9b17 0x56b888be91ad63965a1658b5ebdfdd6e0680f138 0xc4a0fe47e21996e2b55c41cdcc5ca382ebb43948 0x15040d82336cbff49b00a3b1abeb2a062b2d9a51 0x5997c427bbc6518c7e53aadfdd3a8980df3c1ab7 0xdde6587ede9d3a507823018981498f7b192df7fb