ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-64CC25E4C8C9
|
Infrastructure Scan
ADDRESS: 0x74bca5649f0396fb09be3a8015732f2115776f85
DEPLOYED: 2026-05-07 02:13:59
LAST_TX: 2026-05-07 02:55:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Connection established. Peer count: 93. [FETCH] Reconstructing ABI from function selectors… [SCAN] Analyzing visibility: 9 public, 1 private methods. [MEM] Virtual memory mapped: 0x0000 -> 0x606f. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 94 iterations. [TRACE] Program Counter (PC) synchronized at 3308. [VALID] Security status: DEEP_CORE scan finished. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x456967bf8bc72ee54abb00d4df87f2ef50cac978 0x593d4402df9a846100e7ec00ebee0cd93f4ff6eb 0xd197526ca57f14934e7f485df373fb0904d34a37 0x3582d0faf91a57dc892d3e293d752005314d12dc 0x2f6d6510c2818a04152d0cdabf71b372e9e33d75 0x0880c871c7b8fffe9a23cfd6666ffa861cd6d469 0xf7a4b2f043a7ffc2d00fa9a44f89c58bf7c39821 0xed1a05605a6b11362b1ed6634e959ff146c98cb5 0x511340fe2a4dbbd568f27245ba81e09b3258ad31 0xc3ff1c3f4704a18c230f58c5dc2af4d53a815545 0xe51b3ca1913536a875e381bcb259e1a6bb4928d6 0x26f1864ed84c5e8b4d76dd94de0b550070f1c9e2 0x8be8a8d3b17f22cef85c28869fc3fa4590d55bac 0x18a92970a38765b70bfaf0d10e126787e9f6a105 0x5d92a51a7fb14540d581c41aac989563b0f4a2b7 0xbbd6515515dd3098337ac87fad2e2a682582fdd7 0x2f79a3a3850c102e74670d7e3f2f7943c28ca644 0x7b6b0880135c8ff82a894007464a71c81df0e024 0x89c3cdf5c59a09a132d55d18d02ce932179dca6a 0xc1efe0d95c148176e260f4d2ece71a3cbd1f7f3e
Share via: