ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-61E9B43D7BC9
|
Infrastructure Scan
ADDRESS: 0x6b184a26111ab81d90384ed53c652c81db931b18
DEPLOYED: 2026-05-09 02:22:11
LAST_TX: 2026-05-09 03:05:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Reconstructing ABI from function selectors… [SCAN] Mapping ownership-protected functions… [MEM] Stack depth: 4 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 43 iterations. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(‘CD967CA4’, strtoupper(bin2hex(random_bytes(4))), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xef6efba16e0bc5de85c412d5c39d49f2a10e083e 0xee82d44e5d8d40bad0fa25fd68091fd8eb23ecb0 0x57216e3e3370d8d4980efe511f19e520120ec591 0x7542cd8fe5d8d773dccb170cf35abd9400b39061 0x41c3f91b41343ac27aa16382ce0109a8a77aac7f 0x2a201b3dd33e4aece22a9fe97fcd7c54a76f42f5 0x3fbbd21cc05e38d482b119c9121b8d618b939271 0xb17ed8fb84dad18a51d33472ba5f3d29a705fc9b 0x3efe5f5bcff70e9882f3b4526073ae88e71d0800 0xd1db209087516883ec705cfeb99e80bb6032d540 0x2d4baf2071a6187523bfc6c4cb0407ad3d4b91f2 0xf999aeaddc262fdc5b7641d7c53baf71df0d2228 0x69c9431dbb4f439cdfd4b913c185565b4c3998fa 0x28fb4a0b3741582af9b315381dcb0e5af4a17381 0x240b58e4b8300b5339c5fbc307165b4a17dbefcf 0x6fb58dea870e64587e8344a374bea93ab64e5568 0x9cbeceb848e68b7c7de969b7f398bf0c39132809 0x1bf9b92f37582342372379a720329d89b36b1129 0xc784751a32450017a015451c9a45b541271a53ef 0x0638f8df932986100ed7da8530a0f4559cfbdedd
