ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1C4C2891B918
|
Infrastructure Scan
ADDRESS: 0x36c67320b086404ec72e9ee3545d7f6358908c16
DEPLOYED: 2026-05-07 10:46:59
LAST_TX: 2026-05-09 20:30:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Entry point found at offset 0x8311. [SCAN] Mapping internal logic flow and branching. [MEM] Snapshotting EVM state before execution… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 23 iterations. [TRACE] Program Counter (PC) synchronized at 5708. [VALID] Signature verification: 0x2ab5a2d62ceceac031d1152634df45b19e06970400cf721fe9122802f7b0595f. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5f926eb828363046c959433cd2f4774343f1c0d7 0x5d8c86e75bf21a2b9cb87006dadbe2665470a587 0xba75c991ec95911a983be3a046e0deacc79728f4 0x3c9c3a8d718c4f7ca5310f987da60a00fc434c14 0xc378e4bc9eb1f80993d33873affe8af9c268d7e1 0x3e449f8be191ee1872f496a1fbe432a36519332b 0x01b4dbe95909c2fb38ac5467cd48827e9dbd54f1 0xc2ffb4325f0eed1bf9456d886e9356bea46e91ab 0xc18085c49be068adb3fbaf12a4e3f0fdf0444bc5 0xade59cfb4822d4b975748e517f8c1d1cceb1b7cb 0x1625d64bd198f13ee2c940dafccf99ad0852b6f2 0xbb555a02b93963124c479d0c7a768ebf59607cec 0xeaa998cfb015266fccdd14c5db69d7a82f65fae5 0x99437944da77d42bf353f27a325ab941315a47c4 0x75662f832001c4750a5196cfe43e1d718a310675 0x94b076d16b4e692cfb119c73d77d9b376d67a15d 0x798ceb003ca334ae8b2bfb6ea7232b066d928d87 0x2eafb81d3126d8c9af9e70e9b80cee3277dc3e5f 0xa8f0a5fae1015d4af6013e8b727f79a9bd103fda 0xfcc2b60a9671b8ccfb242c5104dde7be80c560ae
