ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A4BF9C1EF442
|
Infrastructure Scan
ADDRESS: 0xe039792614af5561f6910571b08315cd9737463b
DEPLOYED: 2026-05-12 01:56:23
LAST_TX: 2026-05-12 02:32:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Handshake with node 0x716c9ed2 successful. [FETCH] Entry point found at offset 0x38e9. [SCAN] Running static analysis on JUMP instructions… [MEM] Clearing temporary registers for deep-trace… [VULN] Investigating 'Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0x649740b08b7cedbbe1ed2c0c83ea1ee2b8e821b6. [TRACE] Execution path: 79% coverage. [VALID] Generating cryptographic proof of scan… [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xf1ffa6405588506786922a1d4d3b0e37d9d984b1 0x71e6ed898896a9470d1cc706664972ebbaf82309 0xa9144eac42464b480f5dd9cb85dfd3b9430c9bd3 0xb75c545a5ec83d27f82210cca5baac2cc9ab7425 0x44fe3ac195428129a7e3e9f174919116ee4eeb90 0xd854ed90ac003b56e6e1ba35abbf33229c2012f8 0xe693c423c82f95dd77e8d1a0b3b7de9a016e6109 0xa2767762d6ac361fce62a7d19e83df01506e84b1 0x8301884aa8fa50a5c0b92f9da7ca623ea5716747 0xdafe2d6a48b3a4c3e1c47e51086081edba0ce37a 0xd9a444507c12faf921d04ae16960db0a0abf6c27 0x061d0cede01d64ca28bf5b6a9471f1a9e5bb962e 0xde62e17577c48b5fceab6944f9c18d1058e4eaf3 0x5f615046888933e41a05341079bf14d11091633b 0x2717505706dac7804df41328ad07b5c01704efa3 0xcbfd667a086e2c827e7ead827a60b71c3d530087 0xd55a854d54c11b3c2679769f066b772e9f7583de 0x33988614010be265e71ab3a04bd29f0b950bc58c 0x3a17c08f809d15a576355724a0c6a5d11cda731c 0x556a3485b6b430914b248da5541a21d198d398a6