ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-EA79A420274E
|
Infrastructure Scan
ADDRESS: 0x82b353d3e225ec81a64a0b29e6a0eed257f122e0
DEPLOYED: 2026-04-24 23:07:11
LAST_TX: 2026-04-24 23:24:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Mapping ownership-protected functions… [MEM] Virtual memory mapped: 0x0000 -> 0x4e26. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0xc2f1e3f9967a322e911fab7898695cdb7ef6a596. [TRACE] Execution path: 25% coverage. [VALID] Gas optimization score: 41/100. [DONE] Report exported to IPFS: 342cbb9c…dd7713a0.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x96debe0d7f1791406b16b2b1e962618017a296d2 0x35b629939233d49518793ddab240843ade971c9c 0x7b0db2d34a4c801d641b47822c12ad862e512c64 0xc742518eab9d8a5add9f2b0cce5e1772e6329733 0x118959835cf8e5b32459c1b33fdf1cf5f899772f 0x81e621e6bb70f22a988d56a5dc6a020d8d9dc039 0xa20113cbc942326a14df9e4219306e9173b6438a 0xcb518b32ad80a305023514a355c3f5eb0031f9f2 0x48b45eb10698f33efc950fbe764bb404dc3b7bb3 0xef9864ba50e754f2676ec88005b8c86c0487dd14 0xf327b53e8c998f4818b476a12129b20fd6dcb5b5 0xff0753f89ec0efac8145f031fcf52694db228438 0x3df6705d88867ab3c1c8a406748a24c41ca569c6 0xcb2cb0c581e33f48a2808c949513915d93b256bc 0x3d1f39593883ac22118bc21b8130043b82addd78 0x77379d55f2e562f3e21ab662a453696b1e7be7c3 0x25fdc44b1f76bb536ac7d4a41e791adaf4f29f6b 0xf94ee617743f27fa8de0ad4b4767ec8fb902d39e 0xc1fad52042382c89247903e7d2ba4b8f99bab71b 0x92db8b4227fb84db87a708a011392755299fadec
