ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-50C6E8476B64
|
Infrastructure Scan
ADDRESS: 0x171297d0536452e1f08bcc9d3f06b6e43e45cc07
DEPLOYED: 2026-04-28 23:59:47
LAST_TX: 2026-04-30 13:28:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT
EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately!
|
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 8F8F6E3D. [NET] Requesting storage slots for offset 0x00… [FETCH] Received 43 segments of contract data. [SCAN] Mapping internal logic flow and branching. [MEM] Garbage collector: 0.96ms since last run. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0x69ea96c6802a9dea00374d26bc29ca6587dc1d8e. [TRACE] Bytecode segment 0x31 analysed. [VALID] No critical memory leaks during simulation. [DONE] Triada-Engine standby mode. Load: 9%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x6f8df56d7b4ab6f93f913e888d913ada22f3f8a7 0x185962a8f567514cea1e0eff4d591b63baa5be68 0xb1f84f8a40e45c76c9f6a27431d0b070da491c2f 0x494bdd235d234138986093d735afe3e5b674fb28 0xe68409d567d9589d9562781ed896849d089ca954 0x594b4534652deac2eb231ef79ae5df37364c9009 0x5881ffb45ac10610a164bcdc5babd3ff5d73a49a 0x3e6e3d352d313cbb9b9ed891215920c0cd76f915 0xc51f75eb871e5d156ee1b28f5cd6d60ac25f515f 0x10c3d8843192110913c199dfb5821a8c94a50c13 0xa727292633ed18bc1143c1c84991463b05bbaec2 0x9e95fb1bdc7d215ac2d8ebede15de612ddb8c2a7 0xb7a34c28e54e45efc5f38c1cd226203252e34110 0x19796dc46e3c70f1e3472f71ae2ddebf7178539f 0x2245f38a334087218a29511e766e98776b86c59c 0xce3df1eca75a5b8a07f38a68a01beed6608a050d 0x18ea20af9d25f0e4357a9147fa727dfcfd81ec92 0x5da9d776bc739f6e4c398b5de2f06d63b52822af 0x786866c64bbc4ccc4cc09fa2334d70421cc85f93 0x80bea2aa0bb47d93186fbcf01dcec83752c81d67