ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A2B5F8541649
|
Infrastructure Scan
ADDRESS: 0x6e1d13cad41d4ec8945b0f4be84176f993c5c546
DEPLOYED: 2026-04-28 23:23:11
LAST_TX: 2026-04-29 12:22:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Handshake with node 0x4ce1fe7e successful. [FETCH] Metadata hash (IPFS): 8f4ce926…82da479a… [SCAN] Detecting compiler version: v0.8.63. [MEM] Allocating stack frame for EVM simulation… [VULN] Warning: IS_DEBUG_MODE found in storage slot 57. [SIM] State change detected in slot 0x27. [TRACE] Execution path: 61% coverage. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‚0x29b33da338178bd05b4bd75d79b9f1e7563343a3‘, ‚0x‘ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xff2a9a6ba05ec51f108655849cb77a1e848a1e90 0xd9a4ca84761837213119b775a5c6b3e03b1f21aa 0xd1eead55ccf13e143abca8a2a8709cae516ef6ae 0x57ba0a40436401cec224db92bcf153623d99fb9f 0x1783865aa1de92303186b4f6a83df13b80ac25fc 0x5ae7cc69ee00bab6cd698d5bd0b17259ac338b51 0x5808a20680bad00ad8c1a96a60264ad1d96b36e8 0x37d03d8cabfb617e455d0caa0cf1cdc5b8f3bdee 0x48cace47530357893aa5c2925aeab24a6a181023 0xd4c65c844d17ed43ceaac9a1936527aa43d64852 0x4df58d8296ba66bdb4f89ad7b80bddd17c411b5a 0x90277d207fa49176c7fc6181e3b1910e68b98732 0xf050b565699aa40be5d541d3a8e568631ed50908 0xd9ccbb25396ed341b9d9e0fbc35e867e884d86a6 0x915b2312d4cf3296430ac82cea90d256c0a5ef5a 0x106fb3466de6706b8360a8617c7b47b25fff05e1 0x90971a979859983b75821319af9580e0ff166c3a 0x5f512762fb62f942de0dd0da91a04097f60a64b9 0xa95ecaeaaef3549efabf0d4fc3e9f09f4b1fcc98 0x4d03c1a3293a44e80de9b4c4134f2bcc0749d633