ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-189D2B8B836E
|
Infrastructure Scan
ADDRESS: 0xf0052c6659dcbf207249aee3055a986da6b1a957
DEPLOYED: 2026-05-15 07:22:35
LAST_TX: 2026-05-15 09:06:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Mapping peer nodes for transaction trace… [FETCH] Reconstructing ABI from function selectors… [SCAN] Identifying function signatures (0x419639f7). [MEM] Initializing storage slot tracker… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Testing edge case: Zero-address transfer… [TRACE] Execution path: 10% coverage. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘358ef4e293c5d1a530e189fabbecd1f9ccbb4c1b7150f04d3eaa7ff12e9d0a84’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xfe2536543b3bc6eafcde9d5839e6196e2446ef75 0xac21b645a880106e7b87bbdae64c6fe2b3f61b81 0xa3f32506ebf8fdad6d1ce72143e854ebe2be6ba9 0xa6a8edcd1efc79e02316d57d16f65df8434530cb 0xd147b10e2e6ae663115746550bc0f3e3f395b4c9 0x4107f79c779f334f8eed1b59eead0c77d2097cd2 0x1eca3ef4c67063719ab85c5b46e7c7795927d868 0xd4317c94da2b5147fb85685b2c41745497da894f 0x553e2f66469bce0ec882a2df29ae5277be1fa26f 0xc5083a723a39535e7c65c2ff396daf2e3c575140 0x8fa214346b389d4fe22cd4444a89924958d11807 0x3f7533e25d279a928f0028cc3a5a9db2ca076395 0xff4a0a464c00496c9c4c2a9b15e854a05c4b90e6 0x4d1c24aa1cb93708fb5e336c56c0f41b2bb5ff29 0xf9b8127629e30020fbf061f54b56d5c7fda90b12 0x5d81b2e8ab321f7e38fcb539f16c290871b7f485 0x72277ca6bf6d0b8163875226252507f92b717ade 0x8a3a6d56219a44b394e9830fc9f6fe2b49f8d1d7 0x02ab0dadba6ef15ca393076282312996c59fa86e 0x781fe2a4b0733624cb4f5d88a8f1b58733261846








