ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E52BDB45CA82
|
Infrastructure Scan
ADDRESS: 0x1a8e4f88f57ff7b50b60c04f0849504fcfe3bac9
DEPLOYED: 2026-05-01 04:53:11
LAST_TX: 2026-05-01 05:27:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Mapping peer nodes for transaction trace… [FETCH] Reconstructing ABI from function selectors… [SCAN] Searching for ‚DELEGATECALL‘ and ‚SELFDESTRUCT‘ patterns. [MEM] Initializing storage slot tracker… [VULN] Probing admin methods for ‚Access Control‘ flaws. [SIM] Fuzzing input data for 66 iterations. [TRACE] Internal log: ‚OwnershipTransferred‘ event emitted. [VALID] Comparing result with Triada-Security-Standard. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa8f8cc0a2004570c4689d27e620ceb60b3a68bce 0x177f609b50ad9c5e6b789f9f51cbd034ed6a5db7 0xe00047af217379965db0fddaa0b74e842869682f 0xd76b994b6e6350bc298c836cbb58b117496e49e3 0xf5c052f2d60c63004621291944e37a733198c65b 0xbd173effd679c24bc252acd4ba59f4de82358da0 0x79f9e8e0e23136d2fdd4bb559a396dc1a0f9a210 0xee06af381e1f0d2d4e0aa46df0acde2915fea03f 0x873a28a48e274f809afc8ddf5c63ee53018fca46 0x96a3653c592d3450e1bfc360339ed4786a5747b1 0x489f8a64517821a174abb6723f31cd5834fad7d5 0x6ec00f4cb705f95770b9a66c78335634a9a63588 0xa0204c40ab299a26fc7d73a793f36f5fc2ca4fe7 0x536813344cbe215491ef635d883f54102055ea87 0x8bae5c71d328082638b8c8608a2ad3221195dd10 0x3aa534ed8cf4a123f993e36efbbc410bf4fb11a6 0x69953d3c7c62a362062b01594d7bb364c96cdbe4 0xffcbe79fd2a8a727d8ab8d3c0c56e0816f43f733 0xb3d655005597e013d6bced95e8271fc51952f64c 0xfca3a77e42cd9df1f2d6037bbc23c6c380a8ea54