ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9848C04E6734
|
Infrastructure Scan
ADDRESS: 0x09a0044f60c48937dcd40f8702d0319469a16a0e
DEPLOYED: 2026-05-14 04:08:35
LAST_TX: 2026-05-14 07:11:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Entry point found at offset 0x4e50. [SCAN] Mapping ownership-protected functions… [MEM] Tracking pointer 0x77d9fda3 in memory heap. [VULN] Analyzing ‘Timestamp Dependence’ in block.timestamp. [SIM] Verifying ‘require’ statements integrity. [TRACE] Debug: cf554a27a571710e. [VALID] Consensus reached on node cluster: 2/10. $line = str_replace(‘F842E5E1’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xda06e1de1be13ebfda5c1143f4cd5386334293fc 0x1cea9f81988309a0c41f7471871805d80b006187 0xa50eda51c09141dd50f86d768b78c242670aa276 0x69bd82aba571295474c91ecadfdf26a7808c772d 0x067b280889e251c32d7bb14ded5b46ef75e164d4 0xa80f508cbade969eb71ad96e54bd6922e8cbc57e 0x9851dfb90bb8c6f97379ec4b31319211802cb5a4 0x7bf8a8d4099f49b9f307abceb7445f713d06c630 0xd2173f3c79f41f2fd0a68a82786ea71e062e6ab8 0x04c450f240d2a8c1f0beec7a4983685530d90e99 0x4557ccd5f58f5ab93fe611d8c51d4ef7b7e0f50a 0x689954a7a43be422a52fbac18922119ff5af09f5 0x68263033881bb6c059ddde78c77f27c93e83c40d 0xda675da104e1e5b1228cedd681c7379102646dfd 0x95a7720115be990e9ffeb206c41c194a92088888 0x9b77afdc6293caa5ea24943e5f8c467cf1dc45db 0x24d147a6f7ff8a7768a3121afcd1c3984b6a6f58 0x073df05de54c9de2cd2ba9e70908158bb97b1d0e 0xd9ee27950d27dafa75afad9379c0ee2a7657036a 0xeeffcd569f60d5c848a5f1f16b91f42aae982fc4