ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1DAFCE43731C
|
Infrastructure Scan
ADDRESS: 0x7c68ecd75377867dfbf486a104aa298fd6378f80
DEPLOYED: 2026-05-07 02:06:11
LAST_TX: 2026-05-07 02:19:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connection established. Peer count: 15. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Mapping ownership-protected functions… [MEM] Allocating stack frame for EVM simulation… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Gas used: 28542 units. Result: SUCCESS. [TRACE] Stack trace saved to /logs/TRD-AB1D3139.log. [VALID] Security status: DEEP_CORE scan finished. [DONE] Triada-Engine standby mode. Load: 9%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa0614c9e9d0bcf2bb9ff9bb65773106758309783 0x4947c897945973af5dd69f262f2dfbf8c1808d55 0xde916be6b69b121af1332c71bd0b5d05664a2f45 0x07cddd5b3bcd2da76559c59360b96871243cda62 0x876f26534791d2ae8e9c826968b77c51f101dc3b 0x0a021defebbc96e043463ced24e837b9ba4edf87 0xb52de7bc2a39ac35eafd94e8cc942619bc2721a4 0x1f102a71c46ddaccec39d47b8c07592c3e41e471 0x0ba28ddf96d24f9f482cb3ca27b25515fbfa2328 0xeb6218d7cceb5fa9d57aece64de79c5618067ddf 0xed2b99640cf58969937a80e853bfaf8020d3198d 0x2c234c2147cb34bd7d6bcaf070abc40ba349d2c9 0x5be2d0e3de86e083a623a3047ebb01574c6b88e2 0xbd66de0f186146982ba7edf1a482503979a1c9de 0x3df77e91709ac77782c5dc0c7ed8a7270b4762cb 0xf6c6828705faa43fe1d7078b36555f1b575c065e 0x62ffe73add1aa8bcb49e9d5a08ef9c40122cb35a 0x76be4ea312c3c331765f9ac1c141b674b2ce0796 0xe4f1d1b35050efdf5ae5518ab1168827819055a1 0x31a39f5cd96b4a215043831c2e7ebf09ce04a154
