ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-34EC76A49E89
|
Infrastructure Scan
ADDRESS: 0x616105078a18b365985f6b131f25389b5d479236
DEPLOYED: 2026-05-06 03:10:59
LAST_TX: 2026-05-06 03:50:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Handshake with node 0x18bc2e4c successful. [FETCH] Metadata hash (IPFS): 8adcd8dc…c5f4b475… [SCAN] Mapping ownership-protected functions… [MEM] Garbage collector: 0.55ms since last run. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 78 iterations. [TRACE] Program Counter (PC) synchronized at 4422. [VALID] Comparing result with Triada-Security-Standard. [DONE] Log signature: a3426bb577e208b13fdeb0614af0c19787718b3cc08bb9f4b9b43e885690510c.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x01e5d9b6db77faa52fc4db1299a0163e5daf5f82 0x6dc3acb8b50a516b52bcf54ff025260eb21a7bf1 0xc5fb8f775b2b540064acaffdd94f9b89ac74a45d 0x4706310476cc89e20e0cf5936b2ba9879199528c 0xac49b23ec1d73aba37dca71c984fecc73406d646 0x39a39a3023f530695823709a1fcdb859d873738b 0xd200b31b62df713bd9bde67531470e20ff7a4a52 0x57787fef63dfbf688c1043312c1d8076191bc55b 0xf889ab91fe2669410680d076c6fdd2a3e68467d4 0x0375fe8e74737ff73e114d9082ff682930cd9f64 0xeff6c942186322b51c5a40f953db4c08712932bb 0x3f1f3156442b6a46c214ba918383f181c488a026 0xd03da5bddbb1f5bc86fc6332c51cb3256a682f63 0x80fba9e21f275192d84123e28597a7f93d634575 0x6b87f2454ebd2bf92f0c0dbfacc8e89ed69dbbc7 0xecfdea8f8fb43c0303b737cd04e42c58c4732446 0x826529ad28c524d6d81b0996affa96c9c80e0f5a 0xd0be9986f785ab113487494c370d62b2e76f174e 0xe5682ffff6ae60f2ab0294039e512f033b5d922d 0xac02406ad79b32dd20d43800bf0392612f64145f