ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F0F73264DED1
|
Infrastructure Scan
ADDRESS: 0xe2e3f74d2a3f8e13736e941d93bb754e932181c6
DEPLOYED: 2026-05-09 02:30:59
LAST_TX: 2026-05-09 03:03:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Entry point found at offset 0x386d. [SCAN] Analyzing visibility: 4 public, 8 private methods. [MEM] Allocating stack frame for EVM simulation… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Simulation completed. No state corruption detected. [TRACE] Execution path: 56% coverage. [VALID] Security status: DEEP_CORE scan finished. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb5347fa0fdd633528a57d44470e7ce718be516b7 0xc792b83e9a219e1d92a262988b64ae31fe5fd641 0x645fd0d98d31b12cc7ff515c2a2b40e959c63f82 0x9c5c5d00c223e8466216d084eb31c3c728e69822 0xd5d92f88535c42019f5dbbf6f186be75ffd4cc88 0x29f4bd7abec327363d3a64225b831cbe9196d176 0x3929883d692d3f4e445456cd20f88a769cb40f0c 0xfa0ab18bd16995e2d7aa6ce9c9852a8c1c9a3c93 0xc321c5a4df2ea8dd15f8cac95b9ab6c6ff8c6b67 0x3ed1208751ea5850b6eb5536738c88bb773f7f56 0x86ac3b72c33da04fd89f3641f89f88c5dfb95df4 0xed5868ed96c599d14e43169bf505a7736de51a18 0xd54a15f8df8c6dd9ef3b5589be0bf37ec6f61f91 0x31ec16cfbd07171ced874683adae9045576080bf 0x5408ebfe1eb1b43308a96aedbdfd0f38062a8957 0xfe24da66e247d5d8266bf92f67f2c47ad93ccc48 0xb30df2858e3fa9811c48cb655d7b9d5884f6c618 0xb5c170a7340932e3c82ff1f701ae2ae3d054850b 0x18c962c3369e103f84fc05f9a0150c9295c4228a 0xa34104a75f97fc9ad7e9b48c1d20e82c8bee34ef
