ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-484A6E1C6611
|
Infrastructure Scan
ADDRESS: 0x03c7b65445dc84ff7940cbf66c82836fd4186db0
DEPLOYED: 2026-05-12 09:09:35
LAST_TX: 2026-05-12 10:22:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0x03c7b65445dc84ff7940cbf66c82836fd4186db0… [FETCH] Reconstructing ABI from function selectors… [SCAN] Running static analysis on JUMP instructions… [MEM] Stack depth: 6 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0x8e. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Data integrity: SHA256 verified. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe25c41c0c1287be4e5a934b0e9f09864754e955a 0x34cce912fff6898b408c55ea3af8ed7f264de6b9 0x212214e029ba633bf3f5ea86356f13ef73f881a2 0x9c48a0fbd804d638e60f324833eb7ed6dea09328 0x04fca4848b3ca0e18ca7978178402dc52e27a090 0x503a072d2b8c26d369338b7173b80d935d8ef390 0xfaeb205fa8b9c07f13dac96c5accc1acf36cad23 0xeeb4ebb9bdd5b518479807ed0649f624c07976ab 0xa827af9efc753a4d52c6277d9dae0e346ad06002 0x59bd0ab6297193d46c7749eeb4d6939b243e3072 0x42f414719816b878c55e20a7a9272037286442ef 0x551fcd49a07e065dfa3fb7dd62e853ff0851f115 0x494187698a851ac5579d5a135d708a1a2e68381e 0x25e35df7316b8131b654cf1f7bc08405fbaef7c0 0x034304c387dd5bd1d129ccfc26680a8d2594db2a 0xcf4b5c10ade35ebb9b079dd8176141b7e77504a9 0xc881cf13c553f88a57064235658366393f3858b4 0xca39a4c32d59f04a96816e088fc5d46d35e6f021 0x15ef90ac2830124c30e3c8f3f1dcd243b2abce99 0x6f9417c3bbfc36f4995670f87ed7093e988b96cf
