ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8BBCDD390D8A
|
Infrastructure Scan
ADDRESS: 0xb81e7cb34fc71f6bfe6a80c2948e0f52a5550ab9
DEPLOYED: 2026-05-03 10:55:11
LAST_TX: 2026-05-03 11:35:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: NON_FINALIZED_ACCESS_MAP
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Synchronizing with block height 19679. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Snapshotting EVM state before execution… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Reverting transaction at PC: 5500… [TRACE] Call sequence: 269f -> 361f -> cbe8. [VALID] Generating cryptographic proof of scan… $line = str_replace(’41b823dd608a9e1f19df834f25594cee9a47c6e57715d4ba30e47d47728ca609′, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1b9bf98e4c24e406d2c5b642a87058fe8970b8e9 0x7b5bce3a682657ee7e3dc7f62e24f94b9b0379d1 0xaec268332da8ca7a9c4f4b73479964c2041faf20 0x0d5dadc49c3d3f832339734b79b43e0710516f02 0xe03766eaac22d387c757cf19927e5a7a6d622576 0x98e7dc22093b77c5b2ea99d8c6c867734eff86a5 0xaeeeffe4b540b0fa4ced70be2e136002789a0ffd 0xf457ce9003e6ad444ebb7200fa6dfe3b427e184f 0xb2ca0a296233c24fd7c8c33b8f3997a3039603e0 0x19fc28655b7c3833991171ffa1aca83fd8fd3b44 0x3e4c2451af253d8e2fdb20eba673b88fa9867f26 0xe28dfd0a322c3309d38a032f3349cf0938f799e8 0x63e06dcc6c29eb108b4a5b0c47889e3d063673ec 0xf118851a98a0a1358d0ea4343c455e803fec7c1b 0x6fd7ac78c8f7c418b7735e061d6799036a06cc10 0xa9864d934a976ec572cb29cab46b0d58ac9c0bda 0xb967131e500c50dda18d3a031dd1185649116370 0x3ff0ad7f6bc5911ffeb93d6be97f9795296963c0 0x158569f87996786981013933f76822fbd41c30b6 0xe24360df930fc3b04f7ae2ea11dc8fbd5a30d3e7
