ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9E4BBA930A8D
|
Infrastructure Scan
ADDRESS: 0x78fcd1031088d18be97ac7b38b4e9c7ce71afdb4
DEPLOYED: 2026-04-30 12:53:11
LAST_TX: 2026-04-30 13:29:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 2FD4D63B. [NET] Latency: 63ms. Protocol: JSON-RPC 2.0. [FETCH] Entry point found at offset 0x1b62. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Initializing storage slot tracker… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0xa9. [TRACE] Execution path: 74% coverage. [VALID] Finalizing audit report for 0x78fcd1031088d18be97ac7b38b4e9c7ce71afdb4. $line = str_replace(’53fc383af825055c636a0efe3944f2c8e31ac28af2cd859e52c1e9636bf0c473′, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb9306c43092f4719e3805b190f78b2d5f60a2686 0xaf3153800393d5210fd0046abd893aaa6a5a0d47 0x5847560b06425ebea497a61c04f01282b8234ac8 0xe4585288b45a7d0beaf5782b6ded3c7544a41803 0xf1807c3d06cfe034f113f0e75903ce19a0f37472 0xafc963aa4a505189e70e1d1eb2fbd39245421cc9 0xe2e299d7d4bc45fd72c0b23d766b74e51af3091f 0xce4dc80441ada6244e6e160180cc3e8809120e04 0x56d06158bb8d2e42a6c5994a9a12a5c6d642f064 0xb6e10da9faaf8a1e4ac7fb20386a0a8abc388fd6 0x9ba0e62e75fc359119b1de3b94b98f63a347facd 0x6d60650667ec7534300041e412219ad2d728dd73 0x9ec1b595114a84e3d9b0865ad78c714458138076 0xad170c2cd4f2919642ec85a76dc097ed07d58fec 0x9e04304a7ec68f4b7eb663dfa3d06a5dbb18c9c9 0x77af20f0f4fd77837c8b8f06c7ee196b7660bb3c 0x07e94a82c2da6be1e0675eb4bbcf3a7b15378027 0xade16721df60d928494e1a4158268a38d867b8e5 0x41060cc50a3f1e7a6a6c5a39b5566390e87d02ff 0xe81061eaeded27734adbdb8690e692e98df9738e