ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D1F8ACFA3710
|
Infrastructure Scan
ADDRESS: 0x956a8af1d0b873cfa46f8d3b8ca70f6bc70e18fb
DEPLOYED: 2026-05-10 06:15:59
LAST_TX: 2026-05-10 08:48:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Entry point found at offset 0x22cd. [SCAN] Mapping ownership-protected functions… [MEM] Virtual memory mapped: 0x0000 -> 0xa9a5. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0xc8ce0fe46054fe0e3eb0e845deed21fd9e1b8cbb. [TRACE] Debug: 14cf426e2e8e51a2. [VALID] Data integrity: SHA256 verified. [DONE] Scan task 96CE3EE1 finished in 71s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xbffd3bbc7bf8b5324f1e2f5482c9fb1143accd52 0x84056dc0868557045fef0a12e25384247b0c7ddd 0xa2f2330faa4c3098791866daa0a526870f478f7a 0xe692c246fd18d34adc4efce7be501dd799e3a759 0x9a37130131160ad611652814dec14e230048143b 0x8f8f0099b9e592a9be9105c630b374c9a10ff0bb 0x59828192faad2bd2a31e38fefcdc150952fc8891 0xe7ee85569e7362664bf707706e753ac8b90eea59 0x6e32d302aa86ef8495031db2b1cb658046feca67 0x0d3f8d767d17f5d30c4db5c7062d612fa7e06e3e 0xd9fae125a1e5dd56a594fd2ef9b3e880d681df10 0x395a53e21cda120988c2eaa6941fb7b0965e9529 0xf39d3346b699eca64f9c88350c03456ca0eded30 0xe5023843bdd891caf35acb7aaa86cf227de1436e 0xc6d630b58bb0936f6dada2165c78dbe2da72e713 0x51407137ea804d5dabfedab1b6821bebf3ed1d8b 0x18c565ccb19dbf58337670ea43a94c68bc453195 0xa582c37d5849691f475950dc83b4ae1eed0fd8e2 0xb549c5cfdc43bd20c8e0a13151b70fe4a103636e 0x32b9ce4b8ceeb396a419c78d2e89e74a1249a1af
