ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-022EDD0ED2B0
|
Infrastructure Scan
ADDRESS: 0x68b9a2759724f174ed6142e90a78d6f1fb8623b3
DEPLOYED: 2026-05-01 15:27:11
LAST_TX: 2026-05-01 15:48:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Handshake with node 0xa61288fe successful. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Analyzing visibility: 6 public, 3 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0xaee0. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Verifying ‘require’ statements integrity. [TRACE] Bytecode segment 0x7c analysed. [VALID] Signature verification: 0x24551f1f355799dc443e5a00c2020d46c2f9a9364bfc54c77c8fc51c992285fb. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x97c925c87baeca1a3d071baeb2ec16742d7a3ed9 0xd5c90d0d9fb5eed10bc3489273b4fe04751c78a9 0xc684867a529431e3da0620e4c257eb8d3daea5d8 0x4f10257c3c045412950087f77b8256319a8bcbfd 0xa727292633ed18bc1143c1c84991463b05bbaec2 0x27e3bac4cc576b05a9a09b6abf530961c06ed4b8 0xa010839ea44251d4c3f0b3aec2e60eb4ad42fbeb 0x575d86570e7d9e2e70ccf821189eb22813d382fe 0x15ba48ae5d20f4724639a7cb03488da02516a0da 0xd071955d1f38cf1635caf50748b47f61afd36f56 0xa6e8451fde16655e3132d1806537b7f9f2cd2078 0x1f774142515edf5bb9e9e6bb479272e51abe0b56 0x953a241e1fc81f6b7d0e5f060a415bb349c4e45c 0x610ca3907d02031d0b584ee9a167ab922bc67b7e 0x9e58d8ffc010a13582eb3184197d5b319a2fa8b6 0x96ea26ce8297259e47cecbc43e49e2daccc9ea0e 0xe5560db88e88deb2e1608fe8e3d2320ac352aff8 0xd7b073810fbfe57e6c50a1ab08db4be899aa678b 0xff546d9526dcbf9023d9b10ea585f9722c3df204 0xb7744534b28f96c3a62986c2b7d30ebbf2d161b9