ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-060AC6493955
|
Infrastructure Scan
ADDRESS: 0x6fbb456c4bf5a7347cb472b0f24151c25359de7e
DEPLOYED: 2026-05-10 05:09:11
LAST_TX: 2026-05-10 05:58:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ROLE_HIJACKING_POSSIBILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Connection established. Peer count: 45. [FETCH] Entry point found at offset 0x3eff. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Virtual memory mapped: 0x0000 -> 0x4c14. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 82 iterations. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] No critical memory leaks during simulation. [DONE] Report exported to IPFS: b42cd6c2…2ce7da1d.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb653ffebf386222ec1425582403de2223b2a459c 0x30ef5088031bac015b944b0cf34f51d438feaa91 0xfb74ab9c0e4c93006064d7c65071c2df916ba00c 0x71b3eb452e46193fb7248799156b4e5ea1a2cfda 0x0021dab69ac9131af487086758c74f3aa19a7ec8 0x7fb85fcda786dd0886fcff97145bc695a0719063 0x1dd1c462f47a2a43fe15eb88343530e9e5ad86b6 0xf9f3ed166702b10f35b0076d7c4920eb9f0ce5d1 0xd32b650a53cc8a96ee5e7802bbab70e519968cde 0x90341b75815e7cf8a4eb8dc8ad1d9b6c4d2d9bd9 0xdf97f1c15828871bc7e424e4b3ea2123f646d3db 0xd9cc7e14a9d037869bd0023e84757c6062426f7e 0x18d4a094a8446abcf22ea5de12c23274eb5ba733 0x415c94f3216086168d20f0a3db744886a36206d5 0xb828c98b7ee5e8b708819cb28c867940c6b9a728 0x6969b94d4abcd32abe4dbdbf2aa7841928d0000a 0x41d1ea730e29e1c039d516907d5dda62c8cbd3c4 0xd8e26eaa8211a5aef8dcec0f87e9f5a59f5e0479 0x5180c48c8dd572c099b9f905940d2cbf95477910 0x1eeb591b9012017a5dca1593dde5f61850f76d47