ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FC5E1B0A2143
|
Infrastructure Scan
ADDRESS: 0xe75a9beeb0de8c7aa1b1922f3d709c98fa03a2a1
DEPLOYED: 2026-05-10 17:01:35
LAST_TX: 2026-05-10 17:09:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OWNER_PRIVILEGE_EXPOSURE
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Reconstructing ABI from function selectors… [SCAN] Identifying function signatures (0xb89c3f65). [MEM] Virtual memory mapped: 0x0000 -> 0x0558. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Testing edge case: Zero-address transfer… [TRACE] Program Counter (PC) synchronized at 6100. [VALID] Security status: DEEP_CORE scan finished. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd607ccb35f8af8b65671e853311188adc3b74933 0x0e3fdb7bcc831ab94421997821719a3709c444dd 0x361788fe69a871bd12ff675140c1e8c66ea8dc69 0xcb3975f5cd57bfd3a39c7462ba16c3a3ecf35b9f 0xe257812b87c19d906f14c897111b5a465f159c93 0xbe57e9c04387a1bceb89c5dfb488b99343fb9f28 0xe8175de0cf1f0dba31ce4ba1c8a474421655dd4f 0x63ee4b415cc5e887b4d749cb3437a34d1a22f2b2 0xac61741db13c4bbde6cfb7d5c424df66c0ddc454 0x7d4011f09531df89eeebf4019485089ca989bb26 0x671679672c89b68486a70909e9211d6b9b9ac0f2 0x5b9f1f3e99e10b0d4a7862e24272facba27a93d3 0x90ec5b8a21349751d0c2654b5f1fbedfd6342d8c 0x79d8796e76b8c2835af6e2005611cfeafab647a6 0x82fc04bfeea4cb13a09f0a1d436ff74f65895a52 0xa659a26553a4893dbc64683c2dbad4f04a044e3a 0x9c24b33e80105cdabf4072587fb6484d4c085070 0x92195c14efbab72aff1259c194b8ff64a554a900 0x085826e41dc91587271c8d8fc6c0a7b3a7d4ff47 0x4e6db6fcd5ba6e9026647e517b5b1f2cc58da9ae