ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-7E4C1F90DBA2
|
Infrastructure Scan
ADDRESS: 0x7a94074ac39a273fa01bdfe5ab65dd8291144fa6
DEPLOYED: 2026-05-11 02:57:23
LAST_TX: 2026-05-12 14:29:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Connection established. Peer count: 97. [FETCH] Entry point found at offset 0x0073. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Stack depth: 2 / 1024. [VULN] Probing admin methods for ‚Access Control‘ flaws. [SIM] State change detected in slot 0x9f. [TRACE] Call sequence: ef73 -> 3dd5 -> f14b. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Report exported to IPFS: 2305a442…a85c0e41.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9c213cf6c5ede00b83c9d4c0b3a24eddc39074d2 0x877450da87eda775f48277c3a00f7b602d759e1c 0xb8df6e3abceed4d615c800622bce7ee482852e29 0x8b969afce2678cab55514d8cff89eb7cc8940fb7 0x94193adbf3866ac72a8a257644139e9f05dcb604 0x114dda6b95548fc6dae450dd1c12beeff8c07d3f 0x3416bb791caa69ddb0de36ee4876d1b283458f75 0x9f8634cdd9d6f9a0b652c7f58acf26d6a1407184 0xcffcaca12c949f5d3b53f96b351a67f748a6c155 0xc309a55f5d0da3a0f10abf263e70809ce268e2bf 0x3c2c9dc6c8091041c7f7f232e525d0a02d68967f 0x0af47c8e72e8d486843e4f1170fb8056d757c325 0xc9ea78d0ab09e12c0027fab88d0b56ccd12bf5c3 0x0665019d6bff230e7fcd5bf30d316944ffe4dd4b 0x2b6ca97cfffde7b99ba50de778e6f0eaef0a5bfb 0x514d68e323a8e1e41042b048f89b34ecb41546e5 0x1b597815218cba45b3f49e994ccc210bb25fcf86 0x6742f88896fec234c4305a2b19dd48fe6f92026b 0x904fd14a66af85468378096c70279f18a676770c 0xd0eb7e5a3d88196504bbb1d3875c84db334ff308