ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FC16837A660C
|
Infrastructure Scan
ADDRESS: 0x6c492a2f65e1989e296ea868d13687aa146f66a1
DEPLOYED: 2026-04-29 09:44:11
LAST_TX: 2026-05-05 01:21:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Handshake with node 0x833fbba0 successful. [FETCH] Entry point found at offset 0xf564. [SCAN] Analyzing visibility: 1 public, 7 private methods. [MEM] Tracking pointer 0xc1d11f01 in memory heap. [VULN] Testing for ‘Reentrancy’ via external call trace. [SIM] Fuzzing input data for 48 iterations. [TRACE] Stack trace saved to /logs/TRD-F4124E20.log. [VALID] Generating cryptographic proof of scan… [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd0e91e6da15546f079145da0907275ad2e735980 0xeb9aea26e62edb42e1f5ab2e5c54acb0e9464aec 0x43fec6d89c4f1492315f7443e1e7bf538fdadf1a 0x07047cacf0d5d264dbb02615f072619694062ee3 0x2ed7fc2abdbfdbe14d08953b08148557a9403edd 0x56434bd6d3ee96c7f309f3781d5d0b46c28fe187 0x27a4c98f719ffb8be66a7f4518696ff0b3d8cd3a 0xbe33fa6eb0b33984bcd88bb573142c6542b98607 0x47987235d940eb5248df1cde06fed13bbfdd5efd 0x888b035e6f64b1c1aebcd6ddf0c9fd7aebea39ed 0x2de8294c4538901ab3f177fe13940735917851f7 0x9edfbde9eae1f6498f092838c84018b3f52a123e 0xe10cde9c80749f5a28dce0a4c4362650f1027f79 0x24355ae449e6f189884679af653211549c19d95f 0xc5c5764a8810145403fee5cc741a67fbcf8ddc30 0x9b75794ad1ad81cf479b7d9d6c11eec9fa633c60 0xb2634d96381b65afbbfc2973fa088c40c894fffb 0x7ee4984604b19017bebfb37a0eeb0d32104da6af 0xad05c45803e9f43cfedb8008779fb81c0be2e982 0x64d538276403eb6ad50e0ec7fa714d439211137f
