ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-F2344FC97536
|
Infrastructure Scan
ADDRESS: 0x56b888be91ad63965a1658b5ebdfdd6e0680f138
DEPLOYED: 2026-05-07 12:16:23
LAST_TX: 2026-05-07 12:56:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Handshake with node 0x98f85a42 successful. [FETCH] Entry point found at offset 0x3fbf. [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Clearing temporary registers for deep-trace… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0xe5b7674fd0fdf2fe71348c3ecd4e5510d8523c4b. [TRACE] Stack trace saved to /logs/TRD-EBACC77C.log. [VALID] Generating cryptographic proof of scan… [DONE] Report exported to IPFS: 2466a267…07fc4488.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3eac5d5322c72222b64227fac7173f34184d9be8 0x2bd358177166c55862edb0fa5e7a7d3569572e5e 0xc5e766c6c7deaaa2ec0d1f25e271bbe293c0514d 0xe4d415d6bb8ecd6ac522697be531a78674bc973a 0x2876a36b5993918203e45f41cdd7ec8daa883241 0x3fa171e593035ad51f27bcbbc162b06cb7e03e5c 0xaf26b6422bdd4013ae8521b3730fe53868e52efa 0x118341bd50a925e0f9190e2ce59b38c8af7651b0 0x30626f7d142ae0af5d6891b215dc3b879bad0568 0x03b3ae6f509db9e2cccb1198271d0bfaecf3b561 0xca860b6202517622715c715b83e03bdeafec056a 0xac40cca014375fcd314abf0eec09a11ad2cbbb0b 0x0fec5e862bff84b04c4c7f814d3dec7048dfae64 0x9b40fde297d66b26d7341282d8d46e655c2f7702 0x47eb5a277c630f51916cb3e373069d5f5bed3437 0x109e1af1fe1c06bb0590df4aca6a1b15ab93f34c 0x2b968a0f0696a9853fab9bd5016edb523163d755 0x45ca243b35d5f4a2d17264381fb5a30066dd8c25 0xfa89177ec3192910f246f42a39832abf3ad4187b 0x55bf6024c53d3b006257ed58257b63cd49f38a94