ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4291C9226FD4
|
Infrastructure Scan
ADDRESS: 0x57a4871f15a79a5f326b6d52e78eb14227765c36
DEPLOYED: 2026-05-12 08:34:35
LAST_TX: 2026-05-12 09:04:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Hex dump completed. Entropy: 3.56 bit/byte. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0xb7. [TRACE] Stack trace saved to /logs/TRD-18096A79.log. [VALID] No critical memory leaks during simulation. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xdf4dc95ac3c7073ecac66f1c968ab265c71c26d9 0x66f2dc97218edebb2a1a13fe87ff3344dcbd2f78 0x03c2142a77041c5c27bd0635bd4553a7ec7b8771 0x2e072c3053cf07ad33909966c32066adb88274ef 0xf120378191b1df00cba16909e5fbea27d4d2a6b2 0x52bdbffbc57e60004469342dca0cb525acacc493 0xf200698367b47cb349d11667146bf08f1f9af936 0x95358cfe43d5cb20348fc9f8441595fdea19a83f 0x280876e1021d09faee815711496298966f873ab2 0x589704dd447fffa95bdf4a3c8571283976a0d8fd 0x5352c6d74b2776e9982b22b8127d519a80691dc8 0x526c4dc5a02d6de736299b0e985756f02f1040de 0xc545203086ddf66ecce7165951a18d2656bab43c 0x242feeae0a75f44d9cab80d98f3d5067a62e7683 0xf4db8870dd80a67b6c5167f5a9fa0b162711f730 0x250fb3e6885afc3c37aa421f1d7ea135f09c178b 0xbf244b361d92fe5000f117e1aa5d7de98cb49231 0x7759735d67c75446dea5eb522e945a9fad029e60 0x2e62a0191e58de93a30431cb38d6ca2f161ff3cf 0x80029dcacc99114745b46b2045cd6318e361ef2a