ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D2800DF7B08C
|
Infrastructure Scan
ADDRESS: 0x685039b67e58d2f1441d03bbd8b96a7264705566
DEPLOYED: 2026-04-24 05:05:47
LAST_TX: 2026-04-29 06:18:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Starting encrypted session AUDIT_ID: E2B357C1. [NET] Pulling contract state from Alchemy RPC… [FETCH] Hex dump completed. Entropy: 9.18 bit/byte. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Initializing storage slot tracker… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Simulation completed. No state corruption detected. [TRACE] Execution path: 91% coverage. [VALID] Comparing result with Triada-Security-Standard. [DONE] Log signature: 8ed9472f55ce079be6a17d6f1764b686da9b35ecf3e0dd032c6a122bd7ce3518.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xbf8ee0141203a7986142000b85f7afabeee1279d 0x47f22aadc2282845e98461583cd536b03a2a2f50 0xce82d8e5ca57297510599de72e5bb592b40cff08 0x876fd157037c482a0a280aeb06fd30262100679a 0x4aba328e5eee4959dbde82cf6547fb059e434cea 0x1ca6d28555921fbc7f903dda880b1de16d41880a 0x2d9cc3b3dfb397c78f78d9c9509808de09f1598c 0x9ab6a8bb694af3324dcd22e2c0bddc16b9ecc2ec 0x08dee80e3aef7c8a4d3fa7c47404f69564f60075 0xb79aae35b00f2250ae7112075a5aa4d616cee34d 0xd494c08e4fd2e676eb3ba2f341aaf09071a73d73 0x21fdfd016dc692b4fed953576c5788ffa5d5977e 0x788d838ff21dbaff6f8cdbd31027435d9ff58693 0xf56209df30cd1dc638b3919d477ff6d2ba33917f 0x724367dc91b995898c593c61f55782cb89c9f09b 0xa995ee471ab856b06bba8a19c4b52fef10dac51a 0x43cd7f5f30350c885e56b4a77baca288d58a283f 0x5f563b9a719b754a7c5fa9e0a5df0142cd0cb0fa 0x467ad16608598ca62bfe889675d192c695b0eaaf 0xcfc5f3c9d625d626b988235e4e1c3d17d539faf2
