ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-56D9DD69EFF3
|
Infrastructure Scan
ADDRESS: 0xab3fc4ea2c97253dae33a31e95d78b4156e29f7e
DEPLOYED: 2026-04-25 10:50:47
LAST_TX: 2026-04-30 17:38:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Requesting storage slots for offset 0x00… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Analyzing visibility: 8 public, 8 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0xba9c. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 65 iterations. [TRACE] Execution path: 23% coverage. [VALID] Finalizing audit report for 0xab3fc4ea2c97253dae33a31e95d78b4156e29f7e. $line = str_replace(‘0x3093862a3276118adcb870d1ba9510c9b0f60eb9’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x91ccb85bb6e33f347aa61030203434953cd214ae 0xa4a6dc27827c0006252cd9448b6d590fbe08a1c9 0x9e1d521894c45fa26e0f06809674037c78e3c1b3 0xd071955d1f38cf1635caf50748b47f61afd36f56 0x9c7fd103cb6cf032544374adadf45b9e5b5d06c7 0x1dbed9bf966a4b10a96f70677de7d02c1dec24da 0xe1f8c05108678917edc4778c3cca949ccd73ecc3 0x848d5f87da089b34be914a6188ef12cb61738e08 0xe0a93e66d5df32f081e7af3dd520c125be23b4e6 0xf8d5d62bf9417240a58149995c39238289c432a0 0xdf906bd0acc8053041bc947b2cc1834feb33e87d 0xee7c9421fd85d9b0050c59276564caff868c6301 0x2b14bdad0d7e5c1a6424f433c7a580c91dc48117 0xdd8c3a6401754cac1b149896cf76eb1b64db52af 0xecfdea8f8fb43c0303b737cd04e42c58c4732446 0x02358e677689fd1623d8ec6078ca53c46fea9ef7 0xfd93a78147d48ad633b15c256836083d2f59b6bc 0xcf361a5d1af9c66407152e54f175d57ef9c35bfb 0xa85f6ad1115e744a8c13887e361970eb6670b6a9 0x2e1f9f5a4306f0cbb904abab4376b842c8ee8656
