ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2DED748D2BFC
|
Infrastructure Scan
ADDRESS: 0x2ce943f52761e08a93ac2e83dc643eea9a0421f4
DEPLOYED: 2026-05-13 19:20:59
LAST_TX: 2026-05-13 22:43:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Latency: 88ms. Protocol: JSON-RPC 2.0. [FETCH] Entry point found at offset 0xe827. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 6 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0x3531c6c8add9ad1dee6acb817e7e6b6614a1a05a. [TRACE] Call sequence: 5468 -> 7b8f -> 633f. [VALID] Finalizing audit report for 0x2ce943f52761e08a93ac2e83dc643eea9a0421f4. $line = str_replace(‘B16C31F8’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf6ca50c188805589a4cb502ddf8056cc611a8bb1 0x79e7d79d41a05ca19a1fb0a4f77b0aed0491dbb7 0xb4ba4ad2751d376608e5a439d552d1b3b8dbf60d 0xc7187948f6a5b0bf045d403c77dd04ffbf6af572 0xe46aee7d9ea41980bf3bb99c743622f15ac84a93 0x03c7b65445dc84ff7940cbf66c82836fd4186db0 0x591bd632cdb30284087ac627154304d3a618cd44 0x7beb7976ae3c4f0ea7ad9373ea2116461248ecc3 0xbf6645165e59b6c3026da62a1833f9393f34de2d 0xeae7b3536a2f2895b700600af17fa8b8082cf34e 0x6f982feb60be1377c3ae3b11552e2fc8b91efb1a 0x60f36bf069f9630749cabecf3ed19ea9675ccbd9 0x370a83beacc23c6ffb2e3cf6eccb8814c67b558c 0x77b16fdb2360215bdfa8246ee3694d3b7f95d1b0 0xb2ede16508637f5e853818824d5ca1fb37527faa 0xd132e2d94c51c7cce97fa1de4d66ce8d5f9938ce 0xd6f811955ff89eb14b0e0d5f058a8b30d0bf4781 0x1699a66119ff5a6c894a1bfc9cbb6b27432c2d17 0x9029ff9b11d666d50a2f2176c63ed5e369b767a4 0xd896842930c965a38aa9dda0fa6813cb46a5c477