ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-BFE64744C586
|
Infrastructure Scan
ADDRESS: 0x424a0db8614f7bec1db4c4909d4d0bb66db5745e
DEPLOYED: 2026-05-09 13:09:35
LAST_TX: 2026-05-09 13:51:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-8. [NET] Handshake with node 0x88575661 successful. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Identifying function signatures (0x25967596). [MEM] Virtual memory mapped: 0x0000 -> 0x22ac. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0xd1. [TRACE] Bytecode segment 0x14 analysed. [VALID] Security status: DEEP_CORE scan finished. [DONE] Scan task AF6D466A finished in 70s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd090f8dec874916d2e2a501d607fcc75342ec5a7 0x7c2e445238c8614b421bd9311219d2d5405010eb 0x3c30c9cbc536abe731b230b867279468ce6c8e36 0xc4bf9d0cc28ff25368d4bde86ebbcf5015815191 0xcf192e6a0a9b17bb0c0fb45d3d9d472ec288f3a4 0x6f03e1fcdce38c47a28f579cb1b667d810fb7689 0x1e8899230e545e61c535cf993301c82f523d9736 0xea7d38e4efd8051d91d4957fcbfd7fcb49affe75 0x7208e12593b7ab2f0f19bbcaf3676aa8b2adf112 0xb2f115156b029a8f84b8359f438fe54baa6127b7 0x1e7268ff39dc1e7edf7e63d400b10381d2c3bdbb 0x9c7f943078fb2493c6caab262caab33bd8a1a9ce 0xab86fbc4f4cc7269acf744e1aead62a2d45e5a7a 0xacb75f45c713be6cda87edd75d335dbe7748e5db 0x199b0465c26ce3a09f76d1ebc54dafeb47df12fc 0x032eacf9c6ee885c222ee519c1fc6618f3562749 0x932328d26384c5ae77f7d65ace3641468a8d628b 0x018be1472ca5eb3174b36fb0d6eda8b1c48f8588 0x9065bc09d705d333a1a619c638891f67365f4b62 0x9bbe1f1b39eedd870045058289c3aabb6ec51a94