ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C20A28A489C7
|
Infrastructure Scan
ADDRESS: 0x8725cc988978a896e38a44c0534970e7f4b37be5
DEPLOYED: 2026-05-13 10:11:23
LAST_TX: 2026-05-13 10:31:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0x8725cc988978a896e38a44c0534970e7f4b37be5… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Analyzing visibility: 7 public, 6 private methods. [MEM] Simulation buffer: 1024 KB allocated. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Reverting transaction at PC: 3032… [TRACE] Return data: 0x57aec4c2… [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘c8a022fa…8e7034e3’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xee5bd9fd08bcdbc0d52fa94411746f38d787aff7 0x0966cbcbe351eeedf3c9aa21b1b25ff0f03de474 0xff11cad99f2ed773d15a5a5b12190fb0c8def5ce 0x0975e58aa81119dfad2d5c34c773217d450c9627 0xd72fe80ef3d3da78999943792b07330b63afb429 0x46eecb295f5fd6b3f07b3a16bcaeb3d924f8262b 0x24537fbaa198c6bea6afe27203691a6f1a4d9d55 0xf50cc8e3bfecdca22e29487a9da522f1bbd61ecf 0x770e656e3c888a63d82cb274d8a77824170f4fbb 0x007a562b5b649620d5fcff5d73ee908e8465ed11 0xb24888fac51e7852d3ff2b758f52044fbb55abfe 0xce09364b5c521a2a56a6ac2abd4db1a702405bd7 0x2bea416467e40543a880462d6accaad278f2bb4a 0x192eea6fb9f45c385d27473cea98911e305a6554 0x374310c0c01ab45f4e67af01163b90ffb6bfca59 0x898199df0c804633c626a1048ef4b84fe5846e02 0x106dfa52f0e8a2ee43441657e406f5e1335b06a1 0xbb49691e82f09268f1b257df767f24a1226e35b6 0x5496dbd4f7bb7c7dc2a755f70059dd2821c0fc15 0xef57cd428709fc053656640db7c4eb48055322bb

