ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FB5D56F0F7B0
|
Infrastructure Scan
ADDRESS: 0x39b64ac8f34bd92e35a6a805f25bd4822473f974
DEPLOYED: 2026-05-06 10:27:11
LAST_TX: 2026-05-12 01:28:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Connection established. Peer count: 67. [FETCH] Entry point found at offset 0x4458. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Snapshotting EVM state before execution… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Verifying ‘require’ statements integrity. [TRACE] Program Counter (PC) synchronized at 7731. [VALID] No critical memory leaks during simulation. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x845e3854372414443defb54e6d218fcbe5f7222d 0x8ea59a4a46c2b44b38af1ab09105c5d8f9ed28d2 0x157416cdcb91648454ed3e8bfe49cf248b9cdf67 0x85f454874e24cce7ca4d3ded47e387692ebd3657 0x36c7724262171250b985206a7ee2bd76f3bf88ad 0x0eeadedbf44426fa582e8ec5d3ece820b1e05847 0x0297330a8a02fac26a57faf60f72dc3984419829 0x62287bb6387d1e2fc88049a4a32accb5320067ae 0xb82c1209672c88ad80f5ff055e083ddc51ab26bd 0x7ffd674204ed7f09c9bc21a985065460ad134b3a 0x2022678dbe71315ac17e950e3374f0bfc9898698 0x765b53c4cf355a80b9b758b01f3c830cde8955d6 0x6676260a06334bc69cc2dc813c967fe2b5374c2e 0x96ea25b18bd9411791348d038fffbfc0d396bc8c 0x039ce37f269aa68011368debf0148d1612164c2c 0xaf02e3e6a774dd59e95657e0fa441ab1915ebcbf 0x0beddabdae3b11359975e8fae0578b200e16c919 0xe6dced60910cadcb880d004d94791fb6029b2cc1 0x4a6b297488ab34b3e50e4c1af530f1c017d1e6b9 0x0d8449c85a8880b7cbe1465f68df9fe0ab5f3dbf