ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9E839F8D88D7
|
Infrastructure Scan
ADDRESS: 0xfe2d9f4f70b1dc2a7c3d940691eba293488178fa
DEPLOYED: 2026-05-12 21:19:59
LAST_TX: 2026-05-13 04:27:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Reconstructing ABI from function selectors… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Allocating stack frame for EVM simulation… [VULN] Warning: IS_DEBUG_MODE found in storage slot 71. [SIM] Fuzzing input data for 69 iterations. [TRACE] Debug: c67d3ab62731b7ca. [VALID] Security status: DEEP_CORE scan finished. $line = str_replace(‘0xf9675de6be9734e769d3bacc1d500743c0b55794’, ‘0x’ . bin2hex(random_bytes(20)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x93c93868c5b178c50ccef56fa7a6882f8fe4f8ce 0x920438e754e91a3de0b3e7cd5af583aee97c0229 0xb8149eb500fa2aa413e365ee88f4679951ef541a 0x0fa611ab9050c9043a7372839bf54e58c798f524 0xe6dced60910cadcb880d004d94791fb6029b2cc1 0x00afff886bafe91c1474f70b5e903e87f671e493 0x4c3a3dd260deed417b2cee6c8418bbfea04c3041 0x794661c9302c9b6b3efebe1d31f58f9df550a3fc 0xe587cd8e92993b9aabfaa6a6b64bda1139a9e4ac 0x25b157d1b9c12a4be1bffa00375695f13fde8d54 0x144fd4ddb82a4850430154af53d80842a65f0f23 0xb393c7fe526f69132ea83a2669ebea8cdca7c179 0x5ecf2d67e3723e4bd31b607373628d1748b81937 0x71d200cceb2869699efc2efcfc3c8fe7256c102d 0xbe2b24a73dd98f4a56124ff976b6a35ad7be7fa2 0xf52b6af0df0a9f99b0b52b18ef21d48003e79882 0xa224315ba76d774eaa1d824b99765f7c53527d64 0x5099cb85b3f800e098014a160d2057eb386f2520 0xb580a36babf5eb6967ec47c4204b0e0cfb88f0ed 0x88b9fe33eb17365a1423b1f174a1c4082e9ac19f










