ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7E28A1C6C455
|
Infrastructure Scan
ADDRESS: 0x68ff3827b7db95e277a8d5a75ae95c8efbd8e134
DEPLOYED: 2026-05-12 15:36:11
LAST_TX: 2026-05-12 16:41:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
? OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Pulling contract state from Alchemy RPC… [FETCH] Entry point found at offset 0x2602. [SCAN] Analyzing visibility: 8 public, 2 private methods. [MEM] Initializing storage slot tracker… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Verifying ‘require’ statements integrity. [TRACE] Return data: 0xf1b73fd5… [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘5811c114…03d02989’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe146d95f9591ae02ce4189a06a62ee3c38ba6376 0x110052c3038ff574cf9b32c06fad2cfc6039e5a7 0xa13b6ab17b77a55f99badda2c77c3e24e2d0abe9 0xffd1a9da9a20cb5a48845a49f1f61c30e5614d11 0x3289b9db5d692eab3efc11c0353f7bf175e9c278 0xf8ee2edc2ec80e68b4e2c4745d50f32a552930e5 0x40c0fe0a3acc207ff9b252edc5253b1ed78f6cad 0xf66814dcd49bac31fb7b19c65a7ce6d5109403b5 0x0984bd47cbc9774768b024a3f9461d99c90c8394 0xf0d5c8e61079e8342d742a6648ee5aa53ed11285 0xe36eed60dfae6fb68ae2adae434696a30b4a4b20 0x94e227c6cfb66a99725c1ef169e9bcb5962314e4 0x606470448aabe74a59ddb061953b13c2ca473304 0xd1f18c2d541338530e3ca1ebf65d1ed1ab81aa6d 0xa65369d821b1a2c5e4152b7f8e39db5aa69ae7cc 0xe5fc5a94ed52d74cb0c57a2ddcb54da4536f74a0 0xace53629c76bea1c483c52077417f69ea67aa6c6 0x385890bf1638b022d1c0a2ec9c43fed0c96fff44 0x380674d7a829166391adc9569a9dd6425032dcc9 0xadc93f5fadafad0d141b8820ba587a3b4628f0fc
