ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-6630889745E8
|
Infrastructure Scan
ADDRESS: 0x1a66f9c2ded2b8bcfb39c73dba873248b688645a
DEPLOYED: 2026-04-28 18:13:47
LAST_TX: 2026-04-28 19:00:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Handshake with node 0x932322e9 successful. [FETCH] Entry point found at offset 0xf466. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Snapshotting EVM state before execution… [VULN] Warning: IS_DEBUG_MODE found in storage slot 41. [SIM] Reverting transaction at PC: 8785… [TRACE] Execution path: 40% coverage. [VALID] Generating cryptographic proof of scan… [DONE] Triada-Engine standby mode. Load: 9%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3b6ab88cae8c44b107a8041fc383700221df2499 0xa454da99bd26de1a65089e447e295e12c9b426a2 0x694620e3703b25b75f9a6310bd24772f83fc7e9d 0xf2fa2fd0b3a78c86421b10642a421a9b9f0e2ed8 0x332c4e449408ddfeeb27f0115879da5100e564d6 0x4e82f6076300c30266355d0c63f1729a93aa381f 0x6aeb2159d4b3aeb842ac458a8e825a123822105a 0x2ca0036b559c1e293eaac9dcd4674a0316d3100a 0xd71aa47f3c118c7df096afc66ac74c92e9405c9e 0xc2aa51bf54e50bf03bcfd4ff15d4cd3a1052cc13 0xdab93e727b2382972c0863a7ac22e8b80bfbbc88 0x8b0da21aff4660b9130b467214391be70ce8a200 0x985ef36a4297510c2980407ad417b456935f1b0b 0x53d0a52d4efe5cde78fddbc49252c01f79cdc74f 0x954c8056b37a5a181b0151f96bc6e4e064c3e248 0xa83ad10794c9c4221a8e829b35694222d605f5ee 0x0c53ac1bd8e42c27863c6e6860cfd185feb89747 0xae61a9fad96d5d3040013640e5d1a9d6f914d854 0xf0e43bd5d771c40542c51809fc4888fb3c7fe7ef 0x29ab51cf3e00f63e1487c97585d6e28d7c64ca89
