ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D10D80FB6A6A
|
Infrastructure Scan
ADDRESS: 0x2aedf43c3f0bbe50e8404792d48954be2047e1bf
DEPLOYED: 2026-05-03 03:55:35
LAST_TX: 2026-05-03 04:54:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Identifying function signatures (0x48d82323). [MEM] Snapshotting EVM state before execution… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0xc0. [TRACE] Call sequence: 41a3 -> bcc8 -> c16c. [VALID] Finalizing audit report for 0x2aedf43c3f0bbe50e8404792d48954be2047e1bf. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9b85bbd89d81cf52fbe3232ccf796e4d8a0b2345 0xfbb1d594ecc41e91a2a10da60c41c75996fcf600 0xf1b8bd3f1b4fac6b8502cefaef3155b83259ca66 0x435dea6023043307590aabeec1fc63bf99ebf209 0x0c34317291893b92eb51c9d2bc6d71de75e853c4 0x8c5b07a1e43b6e82f87e1fb6b7d70a039379d881 0x40a31b28640a750b0f480b74bcab5cd24b665fb9 0x33cea165699058014058e209d8f3c5e56ef5240c 0x3daade9225bb6ec3ee98cc2da9b475acfd39410f 0x70932f89c782c2250946dbf5fb7bdeeeca1ba8b7 0x4b173d38b6ceace906ac09f34b7d94b57ae0c0aa 0x88fa30f482b334361bf1dc37a1022ea3e59b582b 0x67a1b31fe4e35e4de830754dc7243cd06d32aa8a 0x68c70b39646e86d694d732df370c7313b774d35a 0xbe688e960a54647ce7013f834dfe6733050134f3 0x417df8887eb35015a29203cc09dce95bb64d987f 0x272010273cd13f14bc9342dd324ce46c067eda03 0x8d6f11aa7f14f6d394e819a63bcefc85980042cf 0x193e0e6ff1d00cd5413bd54a42ed10956f3f9c3d 0xc14f9f4bc57d94addd12a11c852ca354d77a61c3