ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F3EB8EED6E43
|
Infrastructure Scan
ADDRESS: 0xd425c2446cae326b01abdd38cfeef9ee17ed75a8
DEPLOYED: 2026-04-24 15:22:23
LAST_TX: 2026-04-24 15:50:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
? OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Latency: 49ms. Protocol: JSON-RPC 2.0. [FETCH] Successfully retrieved runtime code from blockchain. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Virtual memory mapped: 0x0000 -> 0x50ee. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0xcc443ae7a284af57130f1cfcb6ed9bad4184fcc9. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] No critical memory leaks during simulation. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x808fdc5f6cada93be53a60d1b9abea44ded2b3a7 0x989aaf82714f3de8d4b21f4c7285f9db2eae0357 0x56c8f2ae7b3243bc8720c67142b6b5a9fe4e28b3 0x1a34fa1baa8adeb594c80573245fbfd87b3da4db 0x7178941c061208374645ec616a6938562885893e 0x2d399ed3b304cde030fd31689a59fb8d44660ec2 0xa840be00bc1de2e06b7f64851fed7464e53c869e 0x011db9c098d6af6a087c389ad91bf9eefe442c34 0x1b77f243357d9055f4d815d8199f77f1f4c7c9ff 0x47c25e2c8efb705028decddccd77e17cc501780d 0xe51cf44fff703f272a2cbc5d0984ff551ef9548a 0xd7a6f7e6fe2fcc4e6dcc4d0221bde857e402802c 0x7bcb750d388822ba6bc0fab673d7ebde2e5fb996 0xf009f56bd2783e8eeda5483791baa8fdd53f127e 0xc96d68f3498182bc187236572041c72623d87223 0xf115bd1d33383748abaa8b0ad55a1e9559e4463d 0x99882ed2dbbd8ce9a88f5942ecb2a9170c414326 0x416a66e623cc066d589999aea110e854f45b0036 0x537f729b6673b1ec8e01896b8455d9e107deba7c 0xfc575cefb94f8b10967419f9e900940c85e91768