ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-432067AD94D0
|
Infrastructure Scan
ADDRESS: 0xbcb2bca68edf968ad7304cb71ceecd3ad60962bd
DEPLOYED: 2026-05-11 21:46:23
LAST_TX: 2026-05-11 22:37:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Synchronizing with block height 92794. [FETCH] Metadata hash (IPFS): f7b8381b…88bb862d… [SCAN] Validating EIP-standard compliance (ERC-20/721). [MEM] Stack depth: 8 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Verifying ‘require’ statements integrity. [TRACE] Call sequence: 29df -> bf6a -> fd99. [VALID] Signature verification: 0x924b8f5c7e4d55fac737f47b45abe96e717c92e5ba87479f600737f3da8a518f. $line = str_replace(‘f7b8381b…88bb862d’, bin2hex(random_bytes(4)) . ‘…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x69e40a49417439c4caea4aec05335fbd02c65147 0x90411aa0a3931d9ecb8f7ac8ee8fcb48f874ad38 0xa791f3b78c63d0f609595fdf630ab6e5254425d4 0x7977502defd94fbd8ae5eb5733e2581f7ad6bda2 0x949623419f251c7b81ed6df485e762f620bc9a1a 0x8318e2662d82771387f54b80fbcbb5f193ac473b 0x50f01c52543b96f8ee492a7f3fabff8cf6ffe939 0x9d5cc3bf676bc55acc92af3467f265428beed8a8 0x70f0dfcb8931718f6c7cd48021be1a8611757d79 0x4627f1477dc484e07650132c477df17da9f70040 0x6d8d098e0a2a640977350628c51dc9af7c2975ae 0x0955b58e38fa8794723ac7b5ac99d2df67d55741 0xc7895530fffd90d5e1b8baf1006228f5505c6123 0xa06bb1141ee9aa79c16147c35ad8ece6549f3ee6 0xdc937d5a2d0e1c5406f4e0a9085336ed42bacb2b 0x3104f736e52afbd73bf98d85bc8394759f44fb3a 0x04346551798cec40eca8d18d9352a14323fc1615 0xf0237a1cb794ea830129966049ef99243082ff0c 0xd291e95c4cb270d4ebaa225d2e1797e10ab87c21 0xacceee4d5ad3a6125eb6f49ebf163a2b54dd9476