ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1BA7DAA4BB24
|
Infrastructure Scan
ADDRESS: 0x5b737b0c3e04db2a68257ef8db62d65d82ee1bee
DEPLOYED: 2026-05-10 16:04:35
LAST_TX: 2026-05-10 17:12:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Requesting storage slots for offset 0x00… [FETCH] Entry point found at offset 0xe87c. [SCAN] Mapping ownership-protected functions… [MEM] Initializing storage slot tracker… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0x96e52b082e8e9ffd760fc63dc9b0bf9c0b32741a. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Finalizing audit report for 0x5b737b0c3e04db2a68257ef8db62d65d82ee1bee. $line = str_replace(‘254B7728’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9fcc972c82e4dce24335997595e5959d1913a210 0xf365458056af6a484229eaa510e4e2a66c7c7f65 0x4bf85948b9d461d19c3ab162477eeb9f00fd7883 0x5fc90eed1560b981e78c7ceb3cda53820d3def9a 0xc67afbe25874d0cbbd07572e31a4c070fafe7692 0xc74a878bf33f054dc1e17ce1af6d031c29327fc2 0x94243a70e784c0774ff93ef45f27af2d1602aa41 0x226a7e99d3886b6dc4ee038e582b93c482104523 0x9cb00e129d1bbf6bab6d3be661602ab3f1c38707 0x9a5e3983cac088e66fe4e832d881ee61b37623bb 0x958e992b68401f9a6062e9f24b6a2b61379121af 0x52d0ed5bfee14baa3a0ed5fbe51bca061c98b8f9 0xb78e75c94e8ce784657c9ff4125c23a9b5a3f57e 0x7780791a67425db3a8173f335d0a6e9c5f73b823 0x4b803bf36d8b338ee004d6e31b4cf14a0b936b48 0xa77a599f848b3f2dc55fc64b2bbe013ffbc1d5b1 0x568aba62ec99c06a749d53ab93b1ef6f19a16a14 0xd114482ed392a33c2cedace9616c8bd5b1e937e2 0x62015d115df84564400b8f5894acae2c432b7f46 0x29766be840e4dfe0507b5aef73671a617ebc7b12


