ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-33E894C10606
|
Infrastructure Scan
ADDRESS: 0xe6c7a61b3d9bbbb803be78e48e6f07b630a39232
DEPLOYED: 2026-05-13 18:13:47
LAST_TX: 2026-05-13 18:27:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connection established. Peer count: 55. [FETCH] Entry point found at offset 0x9b30. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Stack depth: 2 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Balance check: 5.52 ETH. [TRACE] Stack trace saved to /logs/TRD-F90E8BE1.log. [VALID] Finalizing audit report for 0xe6c7a61b3d9bbbb803be78e48e6f07b630a39232. $line = str_replace(‘a6d8b7f3…64f2c5ec’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x8ca4daa865d8081363ffc59cc13b56d7c2050c4f 0x8bd3111da7c4e6b694fcb329000176d5c53387eb 0x640dea36d8431fc27876f21b204b5f28857d849f 0xda1249dbafbdfec1c699061660a8d417eb0b38bc 0xd2a8da15b5f6cb206148a7d15217cd4105cf5715 0x57dd62e0986a61a269c769b107a5a7952d73b7ed 0x1abb9b0b11cd3a0e294f3e30ea2e2642f1b9568a 0x2a8a934c31c0b3dc08d37c282d9f9dc589650ec2 0x5bda2baf919b6fc92a1b110629b7fec13c39180e 0xc86392c44a66e9d7dece1d105c9fc5ad2af97ca2 0xe7c15a1edd6c2f04b7629c021a9a1d4e23a03acb 0x550ea6f6138f65c134c49c175338c1af8c4f9e7d 0x25dbddef94da634f4c36d95ae99a9fd6f3890d18 0x44822f13508937cbcf07b44b15c058df6d4fc5f8 0x099048f0a746e7a6ace336b6d5da3c86e8a5d595 0x21dd66c28f6cf53d053b5c95050a435d74a5cc41 0xa4e36d27731b353739f6356ef92af128c2ec5783 0x779ee4eae8159ee0b5b112c8f25e0b61071d3202 0x61054c1f23cfa7f9f58d897bfd0835005eba5ca4 0x7beb7976ae3c4f0ea7ad9373ea2116461248ecc3