ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B655552AECC2
|
Infrastructure Scan
ADDRESS: 0x155731f219152da2d56483a92629cef34aa81d59
DEPLOYED: 2026-05-13 13:58:11
LAST_TX: 2026-05-13 14:21:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Synchronizing with block height 79424. [FETCH] Entry point found at offset 0xaca9. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Stack depth: 2 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Simulation completed. No state corruption detected. [TRACE] Execution path: 36% coverage. [VALID] Data integrity: SHA256 verified. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x02b32c864c30b6ff5024185360cab89b0e2c29eb 0x3d1668e23b2583c4f16d74903d501dc577a4aa7a 0xa57139ef17e296c6179ddcbd92570e2d04353e53 0x3092c74af38001d578e07a3381384bfd9c2d6006 0x87a97d9cfcfdef043e9f0db783cf087caa1fe5fb 0xfb8c508754015a2bcf1263f05b71766ae1cb6073 0xc3069d14e280fed293e4071ef452531a7476bc2a 0xb14a0f2a01f06bcc70b63d03d1673e1d71515904 0x8f7aa1e07a2d09c806883577b3c8f96c306f6775 0xd1db209087516883ec705cfeb99e80bb6032d540 0xfd2cf757ef6bdd79e76fe3b802db2e8213638b17 0x42ea15987d20663e5ba6c3de70c85edc5c049f3e 0x2b917bdd912ddba9cc7df6286fe8c953d45f92f4 0x34fa99b76795f9a4bf00267832b8142411567dfd 0x64a0745ef9d3772d9739d9350873ed3703be45ec 0x58a167a94365b6294900a1e2a4229807dcbcdc09 0x82b198bc5e59665c814a47bceaada0349393b9cf 0xb02181908cbb7b972f1d7e836af833517c713282 0xf470391b200d5111535374bfe8b77f88e9a86489 0x981bccf195cc6611286cf288542f80c45ac5e479