ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-707CAE25C447
|
Infrastructure Scan
ADDRESS: 0x5a73ad8fc8c94ccd8c13c0ad6653bd4602404260
DEPLOYED: 2026-05-05 21:53:11
LAST_TX: 2026-05-06 00:44:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Mapping peer nodes for transaction trace… [FETCH] Reconstructing ABI from function selectors… [SCAN] Detecting compiler version: v0.8.93. [MEM] Virtual memory mapped: 0x0000 -> 0x5a75. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Fuzzing input data for 38 iterations. [TRACE] Program Counter (PC) synchronized at 2550. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘5F5B2FCF’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xef7faf6d76a8f94621d81dfa700d3bc60ff5b1cd 0x895d45d69b12baeb41a7b1503ec043ca7fba2233 0xd528a1128ad87fd9d244806602aa8c27183b1d72 0xb46c5355b6f4bd2ead11d39621001cccd19b9357 0xe4323afec9f180f861ed61c21d5050455f838ee8 0x49429a62a3254a4f7340da0612f4260bd9ef8a02 0x81ffc8b8b963011f787a10c2817bd84509343901 0x42ece8afec2020e9f0868d5f3f22d73f7ec4ee5a 0xdae55839c2350c30153aa81fe635482f70edc1d5 0xaee8117f547873c6f10353f878682507070703d8 0x850766cbf4392b7e195f69da4d175fdc8b1c02c1 0x9f3ab1cb9c84c6025f2ae275fcd05746db67a1b1 0x5d48ec112e34d7587a87c5f54584077fb78da139 0x391aac2ac4798a8aa88092a6ee53df9268602e69 0x95475f424c7778ad4366d67056f072d3786f787f 0x9cb89ae1572bec6bf262dde7819b305d6d4132c8 0x53036e1e5c1004fd2e9ac7ed4183e2851fe6c868 0xfc9c4888bdf12881e08c115fc6f23c6a09876829 0x5f4791a48ec309bc56c650ddb7f9c462b79be3dd 0xeb1043f2597806da9f1c5a23331c175b193d33b3
