ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E8AB435CD626
|
Infrastructure Scan
ADDRESS: 0x75f2943cdeceaffe505aae520dd6a454b9e7499c
DEPLOYED: 2026-05-02 21:09:23
LAST_TX: 2026-05-02 21:43:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Latency: 19ms. Protocol: JSON-RPC 2.0. [FETCH] Reconstructing ABI from function selectors… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Tracking pointer 0xe404034e in memory heap. [VULN] Warning: IS_DEBUG_MODE found in storage slot 12. [SIM] Fuzzing input data for 85 iterations. [TRACE] Call sequence: 2a43 -> 6ab1 -> 6902. [VALID] No critical memory leaks during simulation. [DONE] Log signature: 072860719752b7298f03b9b8e79ae481c57562385912a57b947fecf91e885b9d.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb2880b6ca941e5058f5eacdbf06b7036dcb30b66 0xd67122537223186303c4835682d92044d8b292b9 0x2eda537d3f41738d7db61d4c8b99b364596f774e 0x3b1d185c8f59f159dbebff5bf1ec18580c7eab33 0x23f63943940fae08566b67ebed98f7512278d7f8 0xd3d2056f29004b6db37c50a97630907856e16f6b 0x997ee9e7e47cc1e3e8e9939657f60b528c954e06 0x69413e2bc42d55b3729f561f854f8571f3f49ceb 0xbf19e8568cba837d3922a987f9e001787385575f 0x061b598ad6c9a746936380c6c468cc15131c85e2 0xfd9635cc4a743ad31d6db8a7fb46d61069e049c2 0x0b863d3529c84d4dcdf417c56c565f86fd8f42fb 0xc4c26d9e1e5fa8df9b642c65215df3021498b324 0x6493bbc733a02d40f1bfe4c0505366f0f30dcfff 0x76dc668620a36d91723a9d365ed0365a6c4ca62f 0x520598b4fd2cf52f4c34725b446eda7749ba0e75 0x8b9234b808ed1878e1f820ac64ad4946295b17fc 0xb97dee102c26bfe2fcda43332e721ac5807d0fed 0x255e98cb18f9d6da54233c8552de6b14a8f035a8 0x2369bed9aeca4b8182d81a1ad4db84137287a4d9
