ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-49B9925B890C
|
Infrastructure Scan
ADDRESS: 0xda70fb2ccaf9875a0196d67ba0989547bea1b4d4
DEPLOYED: 2026-04-24 03:28:11
LAST_TX: 2026-04-25 01:06:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Post_Deploy_Misconfig
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Metadata hash (IPFS): 703aba22…2009bf77… [SCAN] Identifying function signatures (0x106bc3b5). [MEM] Simulation buffer: 1024 KB allocated. [VULN] Potential ‘Dos with Gas Limit’ in loops found. [SIM] Gas used: 85395 units. Result: SUCCESS. [TRACE] Call sequence: 3272 -> d78a -> 7130. [VALID] Comparing result with Triada-Security-Standard. $line = str_replace(‘0xb442b0fabdd16ec129b93d39429a969a2210dc32’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x045aab3eefcae51fd001cd17c0a910f05fa37014 0xbe9a63ce3d5ea97ebcc1bdde940c7add04e46090 0x20beb823e8c2f44dffa4adfdf23e2efd82e4afad 0x685e47b1e3446764013e19be115904948257a6c2 0x54a10d11ae4bbc94d38687139848c7cf12d7da42 0xb52c1d388cc31406ed6232f7085b7b211c9372f8 0xdec4ab988e80e4cbcd245ab4702705815785ae63 0xd533affc5986adb044d3d689c2eabc392870ca79 0x6a233a5e1d1f689ed89b8bd6882d0c5f4687bde4 0x117ddd8aeee35f880031bd5cdb5f3f781e7126a9 0xacabd4364a13de25ea99cb4f4baac38016ff0fb2 0x320f35fe2da05844cdad55b5cebcf574a779daeb 0xa3d4f5bac9894cf067ceb7ddab86231a7fcc6d42 0x818ee7fa8ec7edcf6cf2adbe7b99735da4cab9a3 0xcaf46265dd5e3808bc61b5d0ddead006af049efb 0x7d866e1b390d205fb49470783197b4e61c75e12c 0xece77d222248471d1c9ccbf4887928ed389b7cb1 0xb598f4861c830f9f6a633aacbf67df5e3a1f1025 0x3f8411e3853b65691ed3633209eaa9c0420097f5 0x9a16ec3455119b48ad3012ebb51a6f28a6163d96