ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F96D9E58CEA7
|
Infrastructure Scan
ADDRESS: 0xa26475a0fd188730c68953e970ba926b027c4bcd
DEPLOYED: 2026-04-26 19:49:59
LAST_TX: 2026-04-29 20:07:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 72. [FETCH] Hex dump completed. Entropy: 1.61 bit/byte. [SCAN] Detecting compiler version: v0.8.15. [MEM] Tracking pointer 0x14205108 in memory heap. [VULN] Checking for ‘Dirty High Bits’ in address casting. [SIM] Testing edge case: Zero-address transfer… [TRACE] Stack trace saved to /logs/TRD-22F00C0E.log. [VALID] Generating cryptographic proof of scan… $line = str_replace(‘5E9C209B’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x905a9d30cfe5b2cc46dcfff6b3d6d9b7dc944fc6 0xefe517a97fcd79076fefce95b02937b31693b754 0xef6844480d2bf687757b22cc3d756783eae82fdc 0x70b86a666e28891c8e3f91b2bc6991d816ebd154 0x4799fd8c625f761168ba99073c88586c974f2ab8 0x6aff08e2b203514d36be5315bb7d4cfe1bb56a8c 0x0feb7385032f4646f31035880800684b2a360a8f 0x4376e2258d455173546e91e2064686aabfc097ea 0x536813344cbe215491ef635d883f54102055ea87 0x64ecb16e0de01dea5b73b9453a5892176f79b889 0x249dc4d07b05fb80c5bf02981ed53b9ecd9ac7a6 0xbfd73d717b875ffe413a1c78f7de63bb32de975d 0x00da638bf458d9ada2a04526dc0ce0aa9f10c41e 0x39f5c1dc2bba2fad7db9dfc8f0570f243854dfbd 0x9aa61931288ee00ff05d0cc8c906f5719ffbecac 0x8c7875f5d11efc275c2c8c57f22b6128227ae7e1 0xe229962a65d57244c12db32fcdf2efeeb10710f6 0x3c909d53da9eccd51ab857333c205f0e094feeee 0x89b6b0ed44a67c9f0be6584d86eb323d5a909020 0x71fb049d2d80483d317908e7e62e138275124e49