ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D38E366482B8
|
Infrastructure Scan
ADDRESS: 0x258ffe22cde3d9c52faa0276cc7e0baa6ad3966f
DEPLOYED: 2026-05-13 10:53:35
LAST_TX: 2026-05-13 20:25:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-1. [NET] Connection established. Peer count: 62. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0xb8b9. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 75 iterations. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Data integrity: SHA256 verified. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xbd44e53337dbc448a453c99ac10d21ca15edef2a 0x39c598db0456a9e1e53416493ff1bed2696ba444 0x108daf65faabc3fc7745ac5baaffe43b95b138b2 0x58df1cf517793ee543d50403a1b1e6bba5bfb25b 0xb25d07ea9986824fae7cef1c91c4fec3a87dfcb0 0xd41ba081eba1154fa6e54a67a177b31d9dd813ab 0xd963bf887cf0c40469ba80139c912bfb1cd92eee 0xae684153ab628f11693b32989dd513a0d2cae2cc 0xc0d503ff8462f61fd79ad1bf9a504310a7f896db 0x98bfaf95e02e76bba78b938d8748acc4431eab94 0x9b8541b251a3abce6bbc5419baa478bbc6b11e00 0x7b0577aaa28e3aaa38e3586ef473d1be0aea23cf 0x003e140f182c1f34ba64b8185818d7117285e17f 0xd09f71ea30109d244f6c5adaae5da997cbb1134c 0x047b07986b7c816a3db153363c78b943c136c8de 0x9a98b40a54d16c167292b2b09da480ad23924ecc 0x7abfe326ddc6cae9ac30ba5ee2eb3a096ba91819 0xf719a2871217b2e34f1543266052d6cd07190ffc 0x10290e15f214370baa8e90e97ff1ace2a9ee0087 0x4fad1ed23f4751552b8b3f50410e44e0586ab77c










