ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-50ABE91FF5CB
|
Infrastructure Scan
ADDRESS: 0xbd09fee03d57f9c2706291e07d64e9f3c823a7b9
DEPLOYED: 2026-05-07 17:44:11
LAST_TX: 2026-05-07 18:15:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 43. [FETCH] Metadata hash (IPFS): 5390547c…adf1044f… [SCAN] Identifying function signatures (0x21d833e0). [MEM] Tracking pointer 0x27d88aaf in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Reverting transaction at PC: 9531… [TRACE] Return data: 0x0c4d7461… [VALID] Gas optimization score: 57/100. $line = str_replace(‘5390547c…adf1044f’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x34fe21deb407349cd29b4df7470452c94be4a8c7 0x9826955de59999657925fc11c349dd3ab0e88ba6 0x995f3aac8d302c973fa8ebd6b3008c551533f8d3 0xa06bb1141ee9aa79c16147c35ad8ece6549f3ee6 0x8fe74d3f05f8387c171eaed27e3606b802c4b204 0x1a704e2b18dc8e2c140a423551e870da01afa5ce 0x04f8f8940d89b7feb1d50ac2e53ddfc2a084f786 0xedd8c8493f7368082bc3e4a82d69331d9a131be8 0xcd017d0ae7936e43d68528287e1e7c5df7e12e86 0xce88ae83b183de4efe4354b7b367003e4c74b3c1 0xd2eacc07a2a1892edb55c3b52d2df2af69bee850 0xd81ffce4d6b351851a12f6385d5caa5a7b392803 0xcac639d17193b6ebfe8dd23b07a0c0e7bcf167b8 0x114dda6b95548fc6dae450dd1c12beeff8c07d3f 0x20458a3e975e3e4ac204132804882421b99e99de 0x9f4c3bd16692eae3642fa630c975743f0d8a7f85 0x0f3265d1287927423852627adf5d64e2e5a2b983 0xe2551152901d5de2acb964451343a6b781844963 0xb9ec05f848878160e82b278992d8e30873083a96 0x224b99b7ff803bf624c3ef3506addf0866483a1b