ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C5E58773B3EC
|
Infrastructure Scan
ADDRESS: 0x14036ca9176b97abb19f4abd408ff2aff29ba67b
DEPLOYED: 2026-05-16 18:36:23
LAST_TX: 2026-05-16 20:20:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping ownership-protected functions… [MEM] Virtual memory mapped: 0x0000 -> 0x279e. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Reverting transaction at PC: 8127… [TRACE] Bytecode segment 0xb1 analysed. [VALID] Security status: DEEP_CORE scan finished. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa3a4f739873cebcc85f217e6916ebaab3103ccff 0x45f11c7d32510e1c59ad8982c05e7e7b7dfb2ad1 0xda89536c706fa2a225bc5bbbdba21f05d980609e 0xe7c9b5f733516f6d4f6e2c384bf1093d67cc11c1 0x0ee94432af7ed393e13069c08e0e534b49cd95b8 0xf2e2a591845672789c62fff18a11f45fb41c141a 0xb74fe93c7b21314216e6d4d0a353b0e51657612e 0xdf63df807c6245ae1ad45ba94f4d269cb188fd14 0x923eac574a600f6dfd43086105dad55d36359429 0xb8ebaeb61467375942810655faeded94b5c9c346 0x5ecec311bfd1166371f0b4ba953a2c257047a9c9 0x79e3af51bf923cc244a3c7fd15990db5061302dc 0xf79037a8c437560c834979d88b2ea01b0427ce8a 0xb99d8c07dd9bc2f9f1e2a4368afdc96f2b25c8d0 0x8eb516f6ba11be75b550301fdc8da212a01ff016 0xe43115963d83a6d10dc61d9ea1d3b49f71219aed 0xd274493222cf2dddb2c731f29b11418b27c34af6 0x804739d527b550260f633462dedab13399c3953a 0x6f5431518a7f92d538063ada41fef8d0649a9b13 0x6b03a7d554a6c83d38489cbb0ac435468a9cb0a7