ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4FEA1E30BB5E
Infrastructure Scan ADDRESS: 0x82373d0777ec757db1b3e83287f4e8296a44053b DEPLOYED: 2026-05-14 13:35:11 LAST_TX: 2026-05-14 18:16:47 | Compliance Status STATUS: OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags VISIBILITY: ROLE_HIJACKING_POSSIBILITY |
◈ OWNER_PRIVILEGE_EXPOSURE An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! | > Execution_Trace_Log [SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Mapping peer nodes for transaction trace… [FETCH] Metadata hash (IPFS): 02164cc4…d1bed569… [SCAN] Analyzing visibility: 8 public, 5 private methods. [MEM] Snapshotting EVM state before execution… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 65 iterations. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Finalizing audit report for 0x82373d0777ec757db1b3e83287f4e8296a44053b. [DONE] Cleanup complete. Temp files removed. |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x903085fc470ff018720f11162ee86d1f3e637bef 0x42cbcd6bd27f2cb23399762edb69f764d65545b4 0xd8b965872d3f443afbf8aea7dce73760dfde7b1c 0x84784427302346bce30ebd37f8058755e4380386 0x00f8200729f416934448559a5020a93270059032 0x490b0fde8f55ff894cafd2beabc3bd6c3b7bf397 0xd07b0a6c643e72093ccfa0b3660b497592ee468a 0xd8eabdce20b3a4ec7ad847456216a178ae62e252 0x9bfc5fc5963d31a2f97ae419e7366f1607f718a2 0xacadf960611d66b3a47bcdc9b10831569c82fe0e 0xaf7c84957c5309e176de3f48386b80e55cf65c53 0xd654323d454e45ee4179fd1f607bf9213a4d6a97 0x52c7240d0f0b897c7b1d9c2f7605aecb8f87ee7f 0x5d53b3bf4d4d1c0df8e079d40fba671ba1f771da 0x14dfcfa690f81fae012aca476fe40e024daecc49 0x1e5ed93fdb1b0fd347672b10b6a4210928d87f69 0x8a81e17817bdadca64dd4403b246a7dda624c8aa 0x8a1d3df2c27c025a98988ffbec8760eb1538201d 0x8b920e6d7486f05683afa9b3ccfb3447bca59f15 0x50eb4e11638a980e678086b74368b282f4b14a15
Rate this post




