ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-EF5A347203CE
|
Infrastructure Scan
ADDRESS: 0x9f000444f185d3a9f63bca114aab0c651c456b39
DEPLOYED: 2026-05-08 16:05:11
LAST_TX: 2026-05-09 07:24:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: 64BCB3EB. [NET] Latency: 26ms. Protocol: JSON-RPC 2.0. [FETCH] Entry point found at offset 0x3a6d. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Garbage collector: 0.51ms since last run. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 82 iterations. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Data integrity: SHA256 verified. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x06278be437b84e2a653bdf1b7bf62ce2fd9c7377 0xd68218ef4e4eb0095dfdb3215bf1bfe0aaa799f2 0x14ab88e01a4a3a3f8c90392fc3531df0c06d8168 0x7532daad6f3742df2d271431972becca5806764f 0xe496a77d859e390d9276e1b710e3dfae9f2deed1 0x7e0276195d8559ad135867ca02be60b00ff47ed3 0xb4264668c2434453ea36a443549e410b5ff95817 0xc37f003295e4ceb66452be4c13f79e7e3030a09e 0xb4f25fe6d7e90622f49fa13d9ae75350dc3cecdb 0xe4adbd64b49254c92525463b7031da1ae18de6f9 0x370bcfdc02bb9ee50e27e82c02e2cb5a876c8738 0x8e66bda36846be975723337b771b59a4185f105b 0x3d8fdc281d994c31870c9131026bffa8b3bd452c 0xd9c6b2992f165dc011b39fd30608d8b5a0a03b02 0xf250efba9ed2c4775402068f932c522ef7f7a583 0x1b871e4abf7b0c334f028c3f5c20db6eabb5d27c 0x207fe97a2304cbc99ee964fd3a68342b04fedfa5 0x1c861cf03ca8f58c44335acd34041557e77bbb7c 0x7ed5d66d0314b652d08ddf88d830da85ac153447 0x7327cfd94055d6be6c067287e6d7bdf0394fe12a
