ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-EB1EDF681BE2
|
Infrastructure Scan
ADDRESS: 0x1c861cf03ca8f58c44335acd34041557e77bbb7c
DEPLOYED: 2026-05-08 11:41:23
LAST_TX: 2026-05-08 14:26:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Handshake with node 0xe0d5bb19 successful. [FETCH] Entry point found at offset 0x2151. [SCAN] Detecting compiler version: v0.8.37. [MEM] Virtual memory mapped: 0x0000 -> 0x2d9f. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Simulation completed. No state corruption detected. [TRACE] Debug: 6e3938e7bb769157. [VALID] Finalizing audit report for 0x1c861cf03ca8f58c44335acd34041557e77bbb7c. [DONE] Log signature: 964962c5138c7e9eb597a0ec9b5ee85436de770bd6eba56a5d8c5987e6c6513a.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x572792023a5698be77f83493d037a95973f552b5 0x68ec12aa4dcda1c71e941b68d429972b7e7663e0 0xab4554cadd5560de357f9209f5bd02f3a2221ade 0x5fa32a26a1e8b8999cea0ce8876dc3359874690f 0x4564035522c0c8d27c714e965d2a497b12f47181 0x10f1ba531158def9475cc76b0dc6c75736ae14ff 0xd0a34d2278fbca5c30ac0b924957424713395efd 0x42f414719816b878c55e20a7a9272037286442ef 0xc264005ec6c3c74ae2dfd0c60fb1ef5e792b45ee 0xcc6f2665f5bf4c2c5d0000d8271f4126f82e501d 0xfbc40d4bb66ed96578fdbdc411c84cddf27c7879 0x5a73087bafcacb614bf57da47ccd85abefa3e69d 0xd164371a0ce3779912f57a6fd1818b653211038b 0xcb65361ea2480ead23938d0a6e11ac746e503ef9 0xcd06d7e5d9736e6f5462b4850988a575303df904 0x5d654f9801432a464d1675cb5d6d39745da8f089 0x34c134c77bb981c661359920154cfe777805fe12 0x6effea2e1f68a7fc17a9aef6a926660d3e434ffb 0x365af26e5059f3ed0a9d6ac31f458d7f09d6267e 0x69f27962329ccbef719557a0002a1ac6d8f941cc