ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-10247E3B9E8C
|
Infrastructure Scan
ADDRESS: 0x7a4610143452366a3f736445727e9a6e63d78abc
DEPLOYED: 2026-05-01 00:50:59
LAST_TX: 2026-05-03 06:30:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Mapping peer nodes for transaction trace… [FETCH] Entry point found at offset 0x1cb9. [SCAN] Mapping internal logic flow and branching. [MEM] Virtual memory mapped: 0x0000 -> 0xd469. [VULN] Warning: IS_DEBUG_MODE found in storage slot 61. [SIM] Reverting transaction at PC: 8650… [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Finalizing audit report for 0x7a4610143452366a3f736445727e9a6e63d78abc. $line = str_replace(‘0xc57c39640c40609a00dfdd02f5f42f368c1403b9’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6f972c1aca790e6994387ecacd82d0b4328d0823 0xe322ff47032044ab5d724ec289fdbdcf4535f63a 0x6564397e80ffb0d6aff28ec75fa12ac907945fb9 0x1b5ba8d2bc9a0610c0ec0963c66d78248d4cf2fb 0x7bfe8d96491f7b1039f14a8e44439e4dc46f9eb7 0x45146ab33e6aeea7d95eeeb97d09167393d3c200 0x211aeb14a1c38a599faf6de6ab45dbe2a8bee74a 0xb3757fc6724d7cd0b646b75ba074bd6bdbcfd9c5 0x21bdce75878aabb157b01cfac597a3d6971c5150 0x170148255db0c60f2b755d077676c766853dc6e6 0xad24b42610521bdf8547be582c16f65ceebbade0 0xfaaab37f2fa02536c3b56722f42474e4c3d8ead0 0x86e85a8e50814ea658b91037a50c50558dcff7fa 0xe92ecc70fa4b0de7eae734feadc927cfbea98bdd 0x0fe3fee27e22fba10abfdbf54a09a53a79fb4b86 0xcbe2f1f43076bb75c71bcd769991eafb63249d2f 0xe1cf5398064fce032be5076bac15e53ef33d7530 0x5d47492357c2a41a370759b97762031ecb6ff023 0xde830521fd9ebc8dd1bad85b982495095484890b 0x1aa23cdfc941f6b54251c72012a9bfa4bf5394d6

















