ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3DEFF12EFB1C
|
Infrastructure Scan
ADDRESS: 0x2dc15e26f594f2c0557e6fef13892fb32a68c484
DEPLOYED: 2026-05-12 12:29:23
LAST_TX: 2026-05-12 16:02:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Mapping peer nodes for transaction trace… [FETCH] Reconstructing ABI from function selectors… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Allocating stack frame for EVM simulation… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Testing edge case: Zero-address transfer… [TRACE] Execution path: 38% coverage. [VALID] No critical memory leaks during simulation. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcba777240d1a0bd66c8ff67544a054862687b6ef 0x518d90e56f12df909568a4a55700884e8528258a 0x1e4becab4517434963741032aac42e2451f987cf 0x22d6b34f5c4bc323eacd59822f2844586f0bc70a 0xd8912942f8e1306b80cc4f130efd6d2b2fc29785 0x8af32ca4ee971efbfeeac48fb6df3ae259f0d94c 0xfaa784445699dcc95c872a48961d62b9b7a42d1a 0x035793e6804683d2b21214c04824fae2a9a336ff 0xc763873bb5509b6bfe0a76a902207e41f2aaf340 0x4b12d7af2dc9d8e7c44fd085b16b780f807c7f57 0x67b961c13f535431c57200aa7e40c928a2d2285a 0x5f1b8dbd3135c444f9b016f9fa19738e6b98a9b5 0x67603b87353795fd7b30c2fed2906778a7884380 0x63b3ad9946d6180d02740d11bba4b8827b63d8e3 0x95f8847657794b8f5dbf5cf077ed55c5b7d0be99 0x4d78d359a32e696497eecd54ee660463e3122699 0x3ee6a40b0ee1dbb329f97925feb2cf53e7787344 0x4b514571c0a75332b2a7342b741076ca76052c56 0x7f02690e561ed3ffad69d44b11492bd55f65453d 0xfea3fba96cbcd7ce2f10b1a1b6bf1d73e8dd5e04