ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-BD5059183B7C
|
Infrastructure Scan
ADDRESS: 0xafdc22b03d678b9fa8bf1c9cdb3b1b7716f71626
DEPLOYED: 2026-04-28 09:10:23
LAST_TX: 2026-04-28 12:11:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Pulling contract state from Alchemy RPC… [FETCH] Hex dump completed. Entropy: 1.59 bit/byte. [SCAN] Running static analysis on JUMP instructions… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Warning: IS_DEBUG_MODE found in storage slot 40. [SIM] State change detected in slot 0x8a. [TRACE] Call sequence: 0e3e -> f4a0 -> 9aae. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘1f745a0c…dfab06e3’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe5fb9124dc95ab098bc36afd6915e88918b41c6c 0x53263b1c9e5120431425c264c849a63e16471779 0x4d6f7d9763402abe69a0f3147e818b7855c9aa69 0x8df0f64bb5e72d5c8d3a8839f8bfe2e15bd3c7e4 0x8c6052cfb0856e8169867a03db32fdae81bac4db 0x6e01539c5bd6747a6beb2e10b93c0a95bfa947ce 0xbc86b80a0ed98bda8617a5216592db432b20bdd7 0x65ca1cb41903118192a3a93b633a8cda414f1068 0xfd83040876cc6632aa3fc9f999f8ae2e52b8db82 0x6aff08e2b203514d36be5315bb7d4cfe1bb56a8c 0x91139d452c144486d49b388509e459ab8748d07b 0x7a2c645468f4990f36454f61a501bc2d0632ea5e 0x8599c7665f4f8cb6ed2e80fbcb91ca57aefa437c 0x3e26d0645ed54f7da1c55f8c1ec8e864c0c15f26 0xe5560db88e88deb2e1608fe8e3d2320ac352aff8 0x1e989f9aa4226e2d4091e551dc9e1b440a854ef6 0x1986c0080c6a9ca979b40d0a3424f4c1a4dac74d 0x0523a5dfb2b15b3c40e9372bd8f31adcf6c60388 0x04c7ebea20dd91f53a4ae131a48a7197c06dfed1 0xd497cab4456c512d4be6fec52fd968c19d9235b6