ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FDBA3B618DA8
|
Infrastructure Scan
ADDRESS: 0xcd25c5773b05c2ef4ba5b7ee11cecf8d73c49234
DEPLOYED: 2026-05-15 03:51:35
LAST_TX: 2026-05-15 04:20:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Handshake with node 0x92eecc6a successful. [FETCH] Reconstructing ABI from function selectors… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Initializing storage slot tracker… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Verifying ‘require’ statements integrity. [TRACE] Program Counter (PC) synchronized at 3626. [VALID] No critical memory leaks during simulation. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x2163690089228a984a5f0eaf8533e4604240b243 0x11d6bb6374fa927953a74cdfcc95f57fec2da28a 0x6a7dd3b011286cc05e5a087aa9b2c638de05c48a 0x2ca2604f982d5cfdb4048eed2e54100bb377076d 0x126cae061a8dc9f5c6d7f1f99847e9d63c7cf26a 0xdb1fa94856adec2388ade599fb2fc7e75ce87863 0x524b60d058ad1ecf2e39113a723a57f1f95b7e46 0x598272b69e1b533091dcacacca23ae35bab77e25 0x5c00087e1bef8ced5e8cf0c18d641f03cd34f8eb 0xbecbb4ef72b3cf915556a4e22f2523d047dc2242 0x8e880dd7dc08ae18f3d57446cc17dffa9e096124 0x7109cefabdb1af1a4174dd4821e8bf92789ca480 0x1a65786beda2331b66028927f0fd7c727ad55b41 0x016b644499b693b2c16898f24e81a24a364e0e38 0x43867ba8b3ca57a2cc701ed62fbe5399e3697fd8 0x0b7ddf8ae4b403cc737c4843e0c567c91976fa66 0x07419d3aac0939a28a7d08286d3ffd4a04088350 0xe5abaec4302c042d2d6d7288ae700102e1ca0abc 0xcb81a778311f7c02c577172870b060c2459443fc 0x2f2f7cc4217ee1bf176b545146c8b7cf007dfad8