ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-DE767E08ECE0
|
Infrastructure Scan
ADDRESS: 0xbfdcbf15d79a02ce0a0a92c3601457b85b4f392c
DEPLOYED: 2026-05-07 11:32:23
LAST_TX: 2026-05-12 16:09:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Requesting storage slots for offset 0x00… [FETCH] Entry point found at offset 0x2906. [SCAN] Mapping ownership-protected functions… [MEM] Gas profile: Opcode ’SSTORE’ cost analysis started. [VULN] Probing admin methods for ’Access Control’ flaws. [SIM] Executing dry-run for ’transferFrom’ method… [TRACE] Bytecode segment 0xc7 analysed. [VALID] Cross-checking with blacklist database… CLEAN. $line = str_replace(’e5ad282c…90b3d793’, bin2hex(random_bytes(4)) . ’…’ . bin2hex(random_bytes(4)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe7f3089df925207f06e3ac09ca1256158453cf95 0x165640fc827bb5864f32b1258aff4c13b1390756 0x13accc45fbf7399a6a056fe41dcd0af0b25dfc2b 0x7e8f205b015d8f73fbc768b164d437f6a069449b 0xfcdc7f009fae903fdf4ff0fcf2a4e7bd20eed506 0x7638d2e9b7d1b7fbd9e7acc691ab1cd2c22b10ce 0x9fc1acdfd579c8b7f53125f78b52a0031d160608 0x1a50da77615fcc22c35619693102dba0f63ea454 0x5da9f662478d53256cf7961870202293def9d3bd 0x9099aeb35a9d013ee39342a209693e93e370378d 0xf693248f96fe03422fea95ac0afbbbc4a8fdd172 0x60749818073872834228590d2121f4c046dff91c 0x6588eb3f1869f7cf94293f03c4f9aac783b9bb71 0x23b54d65f1facf49cb354c6ba8af33af795c3d97 0x996bdc8088c79e40a0be64f64227f268211b57db 0x60481c1807fd3bf91d1557c65b78db0e3eb92aea 0x3b1d2efbc95457797383bec8bc218440255f6efb 0xdded8cc9498e34687b8774ce1f64e5a9bac7910c 0xaa57ef52d56d74d252ac5702ad5cb7fd454fc037 0xdfc9e6b9c9c0d939f933e497ee3490841068cb45

