ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A7B454765E81
|
Infrastructure Scan
ADDRESS: 0x65880ac567e464d02092534b8524b8116f705a42
DEPLOYED: 2026-04-27 14:00:47
LAST_TX: 2026-04-29 00:46:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Debug_Mode_Persistence
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Synchronizing with block height 93942. [FETCH] Metadata hash (IPFS): 25e9486e…2fb39e85… [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0xd72e. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Reverting transaction at PC: 6036… [TRACE] Call sequence: 3b67 -> 2493 -> b7c9. [VALID] Gas optimization score: 14/100. [DONE] Scan task 42AEAD05 finished in 27s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0788784a62ac018d1edafd946977f55c41a689c6 0x2503c98317753abfde0839b58799a1373287f6f5 0x9eb4b57a03f35935fc86c5500ab23c05886587dd 0x55dd97daa30190f2f501eb1dd109186b8db873af 0x026112aa5290df6493c6355486d1e64ac2ba1ae5 0xe3a191c9cc26dbe4642934bac8b23a92f8f14c2d 0xb8e4f5fb04789f2c0fa49e90798e847ace87f063 0x8b77a5f98bba6954f1edb505f54a921fb79413fb 0x58f1568cfef79efa29f193efc1d0b3523fbef584 0x417a2921826bcfac4b453bddac25a9648c68b943 0xdcbc14754ec42ce88617b51213f8e32774f61834 0x7e66f82699eae82d01464cfc97511ba51cea6a60 0xe1eace1dadbe109bccb7bae566e40f96eedd0250 0x07612476f14bd9eb7380e976f14e21d6fc59a8e3 0xfac5df3e983a32e947c4e53e112080e28de6bac7 0x3f324f60b876bcf5f19bf93891e9b8cc3dd3c818 0x585ad256cc508d5eaba7b44fb7f4b9add5bd17f7 0x1c61487f93aab8b074d2636bd8229d0861471cf0 0xc70deef4d6f0d2271133bb0c363da2181400b43b 0xfb7fb787553919645f8e6e861b15baba4fde87c0
