ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-87DD962488F1
|
Infrastructure Scan
ADDRESS: 0xd491956b9e498a8a54d037658f6f2beb6d0e71df
DEPLOYED: 2026-04-29 23:35:59
LAST_TX: 2026-04-30 20:26:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Pulling contract state from Alchemy RPC… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Analyzing visibility: 8 public, 9 private methods. [MEM] Stack depth: 5 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 33 iterations. [TRACE] Stack trace saved to /logs/TRD-754C7638.log. [VALID] Consensus reached on node cluster: 8/10. $line = str_replace(‘fac04b45…b6a0fc0f’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7ca353c218d18f21931d61080d2a528125bbc204 0x5ac011b559bcbb46b04f1bc456e1443bfbf6c5ea 0x8804494ff8be82c2f9d6a335ea7f9dfddfac672a 0x503972ee3a62480f66e7a1bd485dd5f7da754bec 0x75f91819e50e87da982e799a522590addec1d817 0x1673ec607c2c9a600f1085f5e75760641265c688 0x8c6d1aed2943e5a5ab30dd688ebbdf21c5a9e627 0xacc9a2dd12a455d28b31e4023c83b4ab1ec1ed6b 0x2ed23cc4bb59d24ae2fcc2ea0d5b8898498e76ab 0x5b5b5b41ce63d2dd39a4eac80f21b75ff1b18524 0x3697af2fb30379888105c18682884b49f461b1a5 0x2844cac4142a19cd0679d6b725b678960a24e0a5 0x244c0e44645ce20dc1a9781fd28dfe51c2c253ab 0xf32f044a761e35a51df03d80277fc7a90f804578 0x22d11c8daa0b4639cb93b8ce4de6978bbcc70184 0x7442f7d43d56bcca0f10ff3c5dc5b7c3de7063d3 0x60cc7399212e81f0da95ac7188b38dc8cb95895b 0x63acbdc55557db2b015812f0bab8508e85dcc8a7 0x16f409ca00730231531f0bb955b57a7b7e91acaa 0xdb570459498e87d2f2236401f55ee96eba997990
Leave a comment
You must be logged in to post a comment.