ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FB9C12DE36D6
|
Infrastructure Scan
ADDRESS: 0x9e04304a7ec68f4b7eb663dfa3d06a5dbb18c9c9
DEPLOYED: 2026-04-25 08:25:59
LAST_TX: 2026-04-25 09:25:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Requesting storage slots for offset 0x00… [FETCH] Hex dump completed. Entropy: 1.65 bit/byte. [SCAN] Mapping internal logic flow and branching. [MEM] Snapshotting EVM state before execution… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0x8192de4b00ba6e3cdf45f9571906e66cedc93511. [TRACE] Call sequence: 6e50 -> 78e4 -> 8fe5. [VALID] No critical memory leaks during simulation. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc1d997be43c8d726117e4be2184b14fcc6e5c948 0xcb1c431226e2ba6160431def8a2c9c6bf11dba30 0x6a613d0ef9eb7f02c0c97f1d0e1f47ac128f666c 0x195f3fd45a0d3869178e66b9265789981f89be0c 0x73300cbd11acb8e1a03cefeec0c892523b8ba1f6 0xc73918c50c20941b51bcda9f93d36ba526f13d26 0xa43a1cf315d7e6fd5723f678800b6528ddcc51bc 0x8ee52f60ab1dbeca88ba729bf260538ffe588f8a 0x2ae898fa7524850e0fddf4c12a8b636bdb5cb6fc 0x6741baf9c267f2d35f2025b5d3bad4ebf32f3902 0x05bb36b23f88b4c55f70ea16917cb97276ec7131 0x993fd33db534af3e67a4aaff8cacd633af21a6f1 0x584c933c7d76ff4fd5e99dddae6a25e4cc368fda 0x3c8a5b2d8ea5e8e7a426b09cbb589bdd978b03af 0x6d41dbe60722fad33bdef20d1d8a89f9ab27c8ca 0x9dbe06a09bc634879e86bc641097f578874e6d7c 0x20e42b6377701a9c46d708359000ec95ecc94b52 0xbf9454335b95baa01be52e6e72e76208a2aabca7 0x076b1c712494d4d84d153fa3a1f49027b2ff05fd 0xfe122a3798e189668ea6b64bdee61663e3784088
