ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-509F3EA56D68
|
Infrastructure Scan
ADDRESS: 0xd3c86c15c5751d35031fc05708dfa244f99b07be
DEPLOYED: 2026-05-13 12:57:47
LAST_TX: 2026-05-13 17:11:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Connection established. Peer count: 65. [FETCH] Entry point found at offset 0x4f85. [SCAN] Mapping ownership-protected functions… [MEM] Virtual memory mapped: 0x0000 -> 0x14d5. [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Fuzzing input data for 22 iterations. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Triada-Engine standby mode. Load: 4%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xfbf9a7eaef2a8a4f8a82927fa77b7b29cbd32b65 0xb802409da82ff8c3e19e6166097c62d283043308 0xffd1a9da9a20cb5a48845a49f1f61c30e5614d11 0x2f1b7cdc97bf10326e1b404700540283f3613cc5 0x9c04765a236bd407cb4fe3372b59f3509610a7c6 0xb8eac3fb4e8ad0284934f35e44ce696a8616d6af 0x5643c140a7cc4a21df58334c4faa9303e3af6184 0x2022678dbe71315ac17e950e3374f0bfc9898698 0xb66f36e4cfed08b8ffad4b9389274914051d2743 0x980e56aa2c7a2c3818ff197ae8b3beba2cb3a83b 0x1a50da77615fcc22c35619693102dba0f63ea454 0x3d56291c84a070fdfbb7c04c2eb1b9da3bbf31c6 0x25412f64a224db1ffb4f7aa5480a84632be41281 0xaa4b046e46216a450f7a2204c7f23f0f301bc495 0xa1831272e03aa6d1de2aa4eecbda6c5bf25c26d1 0xf3ad47f9ea6ef93f035403280040ea3076498e4a 0x660c498662556e8426520612048f92959f280f43 0x7af4847208633d71109a7f093ec6c0781357c1af 0x0354f96a2ebd236274626a56d487ce4a183996b3 0x9ec5de796e602b3fb6fda0774e27816e7279d662