ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-49B6F0205F5B
|
Infrastructure Scan
ADDRESS: 0x769d9fe1b29fa573839c2f8157b9220552b4926e
DEPLOYED: 2026-05-12 18:56:47
LAST_TX: 2026-05-12 19:03:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Handshake with node 0xf9d1427b successful. [FETCH] Entry point found at offset 0xe0e3. [SCAN] Identifying function signatures (0x6ac4dfb8). [MEM] Snapshotting EVM state before execution… [VULN] Investigating ‘Unchecked low-level calls’… [SIM] Mocking MSG.SENDER as 0x74de51e0f681c0732f0665dc4c83cb8a23c61fd8. [TRACE] Execution path: 93% coverage. [VALID] No critical memory leaks during simulation. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1521a4ced1dd72fd6c94e4703170da64c573b461 0xc6f22e6d4850cdadbd6efd603e79f1069ac9a7bc 0xe7f82d890bd44e450febc76f4dfe5a3af612814a 0x0467c57cadfc256e6a93abd5401baf26bdd382ef 0xba885fad6cbe36a37e3c4fc3b01719142d4b3c43 0x7e1b39c7ce31fa30a62e729802af89f9a915632c 0xc499ec42cfea1fc5c40dce516a62b6b129228c5a 0x04f48bc57bb4142fefc0d1c2b9bf0d545a3039a8 0x97521394cc17faa841ee117327e72b32f86b4c48 0xc23757c7103c278247fd59ad4e8223a934c3e70b 0x62906a426bfc47e9fd88fe8140a04419dc8b4c31 0x19c55e9d3a59ab0b4f8b5d47bc85419c8f275a7f 0xd5c6c3af38cbd237a871b1e72c55d387739512dc 0x6a6b5267ed2fce3f2b2af6d9184b064cb8cc22c3 0x69e4b306bc00e4b9846e8ca80500b4200d9c5106 0x8b7452f9ee297307860d3b661f4f17c9a0dc2f19 0x586715b439f21d079fe6349f334c062f0632d382 0xd99b694ca80800a92ca30ca4e13233c82dee58cf 0xb7173eca8e277deeeb38fee2f1733137cd20446b 0xff89e87226a50eeece09bda6fe24713c5946622e
