ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E0B5B9A5B7A5
|
Infrastructure Scan
ADDRESS: 0xa53641e3811caea8de295b5263a570b8af88fee0
DEPLOYED: 2026-05-16 01:00:35
LAST_TX: 2026-05-16 02:22:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Bytecode size: 9173 bytes. [SCAN] Running static analysis on JUMP instructions… [MEM] Snapshotting EVM state before execution… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Reverting transaction at PC: 7062… [TRACE] Debug: b449f5fc3748e329. [VALID] No critical memory leaks during simulation. [DONE] Log signature: f056e1c96cbc30064ff8a9f6f7c710e6cfc46493924dfde68142935f399cccab.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb49f1d0fd5ae2a42e253c26828ab9816647fe37f 0x63db6d2b6eb4072a751f3fa83aeadbf5bba81e8d 0x4e5698c6851979053ebc965407aad98d58345526 0xb110962b5655faefc85151085a77f70b4367a6b9 0xcbca25133fc52735a07522b8ff4315295ab19146 0x4d826182002606ba12d7ca64ef33af0957a81198 0x453a0cef337ec6bd7b9fb4723f7536010202c02e 0xd6eb7b5469c13afbf81d1d8af08be64985bc35b7 0x9799c0972ff016591147dd131c6559b054c05fd8 0x64cec1b31444dc287eecc722598f3282a4d17e76 0x16955302a7a134f9555f5b6ac374230dc68dc07f 0x3555def517e4bd9a9aff64e3ee8906fee18bbb01 0xb90343f9b7e1c04024e709d755b67a4bd43c7a10 0xccf59bc8015f38fd250cc5dab1f4bfbaae2fa4f4 0x1fab0768d6349555e48c895ec644c9dfa3ad5397 0x110052c3038ff574cf9b32c06fad2cfc6039e5a7 0xb57ac9d729a2eed222184c32ac5d15713e15185a 0x94c61c32d36e2b821ddddb8c227d6f495a94d152 0x8e0ec514ec70fa36e17ceac4679de2fcabee5715 0x7d5c73c3bc2cc20d06b7ce8b8fe4f5af3f9d2a60
