ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D243E05A627A
|
Infrastructure Scan
ADDRESS: 0x26fa7d332770f9142252481078835d56334bc278
DEPLOYED: 2026-05-07 10:46:59
LAST_TX: 2026-05-09 21:29:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Mapping peer nodes for transaction trace… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Checking ‘immutable’ variables and constants… [MEM] Clearing temporary registers for deep-trace… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 96 iterations. [TRACE] Bytecode segment 0x42 analysed. [VALID] Finalizing audit report for 0x26fa7d332770f9142252481078835d56334bc278. [DONE] Report exported to IPFS: c1f6cbc5…e615c80e.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x25531aedee18be308b03880f22e5b1dc1993f3df 0xf5b6e0179a839600b0ebcdb6f2ac6b397bf48185 0xcbeb1d54470011da159bfdeebca67986e2ce4849 0xce91fc882da4122394268457d4ccb8c2b803714d 0xccf35c5e56f854ced2fe61540647047f40820aa5 0xf7cd3406b4cbeb0a36031c22b092e22f59dc239f 0xee4acc4a42c2d359e51a21ca206df049e9b5dd33 0x0076e424d254fd4ff8fb2d31f991dfc3a98ee3b1 0x9d8ef9aae8d957ca55393fb32855220625375b70 0x2b032070c5514a7e1abd252b92b1763f15be69ea 0x616105078a18b365985f6b131f25389b5d479236 0x18f4e11334f96b5e13b565dff6ac061048ccd804 0x92aa0188e21064ebfc1ea3b0ace9c9ae4b998396 0xc2acb9b0ef4aa5bc73ee37e0fb2a49c1086bde3b 0x5fad9b003bfdd943f159f45f6ae02f23d3387af0 0x405aadd7fc6ca63c2ac174f78a93b7c063bfbf9e 0x2d66e68dcadbc56b9218dc41578bedb69ec12fc3 0xb3044c2034e91c660b6834bc80e761e7138cee73 0x198fbb2fd894e946214ba0ca7cdc6ece8e1e78fb 0x8b3c308e2d78d1eebd7ec8c6c078c77878d0a49f