ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F967169B5897
|
Infrastructure Scan
ADDRESS: 0x0fe29b700c1e07e141052698c179f1d954bedd51
DEPLOYED: 2026-04-27 17:03:23
LAST_TX: 2026-04-27 17:34:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Latency: 12ms. Protocol: JSON-RPC 2.0. [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Allocating stack frame for EVM simulation… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0x77. [TRACE] Stack trace saved to /logs/TRD-134B5B23.log. [VALID] Finalizing audit report for 0x0fe29b700c1e07e141052698c179f1d954bedd51. $line = str_replace(’38B6E32A’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe285be3fa45834cfe7920cbfc05983aa18281b68 0x3b798aeafbcfb953cdf8e9c0c2d823532bb74126 0x47c6d9da28483faee12cc211819bb61aa178682c 0xbeaf286266c1f6f7cc19ddca6155b73f2faf1816 0xc1910444e1c3ffe0e707e5c3d263e9936e642d4a 0xaad057107a35f0ddff4185050bf44d4f1f9b1e99 0x36ec7d13af5ef776e34b828c9a476f0ad4e59667 0xd04284aeae4d936e921e960201fd115efcc29094 0x984d0ba343fb4d3d34ac1375cffdf03115193efd 0xa833603fd82674aec51f8a57c6a27b91bc1725b2 0x6f91ad45a32832dea4a3516d3090b41b6dd1d533 0x3c0b46c43190ee798920da9d25cb0b218ade96ed 0xcbadd39b9ce3a4ab3ea953f121e6a910b8e439a9 0x58eec8f4184876a06db9d4e45c5426f01bf4188c 0x3cebb76ce947d571391a5227ce0bf029408f1482 0xae8407f3c826b750abdf81b63529fd99cfd48324 0x527e96f4a24876eff9406ab56ab0b080a1892174 0xb27029f98a64973069e88d776de8a12140a3d0e2 0x8841348ec452da859a972f80ba0b873bb1fc10aa 0xfb743ea868f3eeb6334f5b1c9725c343295a9e10

Leave a Reply