ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C90957C35C11
|
Infrastructure Scan
ADDRESS: 0x292364f1b88bbd5c71d83cff08efc76c7fd9354e
DEPLOYED: 2026-04-25 16:46:23
LAST_TX: 2026-04-29 23:35:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Fetching raw bytecode for 0x292364f1b88bbd5c71d83cff08efc76c7fd9354e… [FETCH] Metadata hash (IPFS): 022f510a…8d6334c8… [SCAN] Validating EIP-standard compliance (ERC-20/721). [MEM] Virtual memory mapped: 0x0000 -> 0x21b8. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Reverting transaction at PC: 7367… [TRACE] Return data: 0xfeb69de8… [VALID] No critical memory leaks during simulation. $line = str_replace(‘0xf34e21ef037fca5e2bdcc780d55b66ab8557953a’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x813095e7529ac13582149824d2dfd4504db1a0e5 0x9bbb484814f8299e5ddb7094d0ed99428a856bdd 0xb292a04631cbe2ce38d0851619a3f4329e8b8cc2 0xa7c09c99af4b6c975b4f959af780b178508522a0 0xc9ae1a301e2477106cd2ad4aba5c0684e9057c21 0xc16ae5c98021841a2f25ff34c4620a2cdc874319 0x21ad1bca95e75576c6080766513d38fd0a51e66d 0xc479e7f67f88be67567f4830745260d79b4c86f4 0x775753470404cac476b57bd22d48a21a57e46ef0 0x66cedfa30673d2f65bad4b99bbcafeea7d7b0d29 0xd2f175405d3c1a17a0cb009e83f574b09c8d4c6e 0x907ee09f061990654219bbd5d90d6bd52a6b4bae 0x7465b75dfd332917375fbb4cd47637c28437fca3 0xfee23c1059aceac257c9e5707b876976a2ccd3d6 0x0bf8136db4c13925724f4f7f436911e2b285d7c9 0x1aa8f94ef9a6a05476b6b95f522caaf67a0cfe33 0x8187edb2baa10eb40f10021afb351e85f060fefc 0xcf4daee8455e2d1bdb076cb2bb137dcf4d21cdff 0x2fd9eaf820652c30b19a2ccd392b6789c8b50905 0x837c44bb8c3b25d2b2a41a2ceba403136763ec78