ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F2914376BF14
|
Infrastructure Scan
ADDRESS: 0xb654413acda385192c83421afab538cb6c6ae6e7
DEPLOYED: 2026-04-26 18:28:23
LAST_TX: 2026-04-29 05:42:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Reconstructing ABI from function selectors… [SCAN] Mapping internal logic flow and branching. [MEM] Garbage collector: 0.25ms since last run. [VULN] Analyzing ‚Timestamp Dependence‘ in block.timestamp. [SIM] Mocking MSG.SENDER as 0x200ad925e3fc17f7faba5104ec7c2417869c7ba9. [TRACE] Execution path: 13% coverage. [VALID] Consensus reached on node cluster: 6/10. $line = str_replace(‚1c00a032…6a706532‘, bin2hex(random_bytes(4)) . ‚…‘ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4e82f6076300c30266355d0c63f1729a93aa381f 0x8b8840d406d0bcfae227d7903db52673b789cfcb 0x94d5b0182ee4a8bcb188b4b398ce03ba2c1f1c90 0x42498fb605201078867125e1782701bd20abe207 0xf737000ccd256893a2fff250c0079c22782782e9 0x435f98eb0c6a085a439801b9544ff282befc0157 0x52baf1a1d7683b630a43d9bbc937d9c6c3debf37 0xf3fca6c894a76e8eba4e5a9c28298b8ecab811b0 0x0f97f69dcd97fb5cc2eae05d6a1d5d4024863774 0xeb8b96c3aa18aa14e0c3931a25c87878ee57d286 0xfc409831762714fd1b8a3aa698dc08d5ea8a5a38 0xf5520a56d18cf92e9d30064179cf8d9605617ac5 0xe10b8ab6751add23fd80e58490229a394f7df8ca 0xad1b24ebd7a6a7377dcea634a570b884d554070b 0x5df152c34449252e50788dc2da7f16b72910bf03 0x0ff79be91d81ae34624911733c441d9ad37684ae 0xe8a121ee55c0090e510ac4038c84b40b817fda6d 0x7262e689f357a9d1f9a87fa16643f0c08793598d 0x6bfed9fb2e9e26dadd2af1ce8b0028ce3486feae 0x6dbd85a2ca2c131ed6171044c32434e60a20a35c