ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D76572DFD53E
|
Infrastructure Scan
ADDRESS: 0xb0603b41f27f0bfefb7b7bc28ce158414df63637
DEPLOYED: 2026-04-28 02:24:23
LAST_TX: 2026-04-28 07:49:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Pulling contract state from Alchemy RPC… [FETCH] Metadata hash (IPFS): 18584c40…9a58af64… [SCAN] Running static analysis on JUMP instructions… [MEM] Garbage collector: 0.64ms since last run. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Simulation completed. No state corruption detected. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘0x01b8efb74d270a6f905aa0e577093c7b348e3a38’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe1fc5b51ec4e9d9b79cd9782f67d73a34d1a340d 0x4853a69423390395cabb9395497ba6eea494c592 0xfbadd8d3b9a1843ed0a39e7f8e4905b96ca0008e 0xc184d76d1805783312d43ab9cb981e1e63d0562e 0x0a1bf93899c11693badcc87242cc574a8ddba142 0x162b24cd7964492805b76b792fb38aef9d4e5eee 0x3b32dd6b9eda81ec8cd32d59947e4079cd3c1d2f 0x3e3baeb6e0fa7215d6ccbdcb551c3b9744d022b3 0xfb6cfd87d21cd0b13377f0215f68a56d8d52d412 0xca4b499ad2c92ee87de7e1ea4c27bcaa35dad23d 0x3b6bc8a7caa1e2f88029c945938a78cab168dec5 0xf9bab58ec88a3d452215a9609f065b94f13816ba 0x6f1d0eebc3a2360ab83e2927bac7a8c84bb83a0a 0x6d63c94e038667e0cf5cad969336d7f9c588578d 0xe25fd84fde38630a34368d5611380205672906d8 0xf403a028be2dffbfd616ced00a0fe1d4021c0bae 0xb96ccfb484b52e955e8e395db28599c8ece24be1 0xfd913a04fa274a1903d3a4d06ee7da02cedcbbd0 0xc34c5174411c1f0ed6a689d1d14027d86e5e2594 0x0df79d2af37a28758fd3f76b07b3e6a49175b408