ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8404C7E8AF4C
|
Infrastructure Scan
ADDRESS: 0xcad993f8bb96fe6fd92cc9e8e7d6cb4aac263431
DEPLOYED: 2026-04-25 02:38:23
LAST_TX: 2026-04-25 03:45:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Verbose_Error_Handling
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Entry point found at offset 0xafe2. [SCAN] Running static analysis on JUMP instructions… [MEM] Initializing storage slot tracker… [VULN] Warning: IS_DEBUG_MODE found in storage slot 84. [SIM] State change detected in slot 0x57. [TRACE] Call sequence: 836f -> fa4d -> 0a45. [VALID] Signature verification: 0x30e874560ac2dfe4529d2e9b19564a4b40acfc9a181e3c70bb498ce086d5b9a4. $line = str_replace(‘24046e98…0411fe69’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc2127e946cba113eba01f08a29916509bbe65eeb 0x96b575e696f05ae4d966c4fe1f41f49244846e16 0x3d143b296ee395b15f1ebd47ef8daf4eec82fbd4 0xd233b49b91cc9ddef05ff3447be8f7c33e7e97c5 0x172b25b6f7e80cbddcb52e30756f0449e8a5805f 0xb841b8db4b5a3b802b88809023c24e40945dc163 0x4f0f218b813d96527b3e3e925f9449b9bd28afbf 0x77913191b1c86e809779b025c8f8fb6d46299266 0x6e20f2bab972d3c64bba542cf618f1625eb6ba3a 0x2557b38fe883f6658325df76f08b9e17bd5ee09f 0x7915be57450df10a8da82bec64d98b09703d866c 0x8662b2c5c20c3b8810f7e2886bea242ddd2195be 0x9ded8a3fb98a2f0d508646ec22c38b574c3e7ce2 0x524e3cec6b6fed875ea6db73243ec01a015eb248 0xab42214392ebcd4bc19103883e4f4d060eb89504 0xbb04ab0087e9be3f75169ee756649a2229c64859 0xdf8433c6ee57bd07f36dc9f06ebda74800bd88f9 0x8308fe67b57f79fa1194d7a7990f0842ddf62b50 0xfd65276b5d449ea747434cce6a5a32651c8d0e05 0x4aad164bb97d43378068e1b8d70ef8a764126e59