ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3180DB951967
|
Infrastructure Scan
ADDRESS: 0x011db9c098d6af6a087c389ad91bf9eefe442c34
DEPLOYED: 2026-04-24 11:09:23
LAST_TX: 2026-04-29 23:03:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Connection established. Peer count: 17. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Mapping ownership-protected functions… [MEM] Virtual memory mapped: 0x0000 -> 0x33c7. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Testing edge case: Zero-address transfer… [TRACE] Debug: 6e73189bc7b73346. [VALID] Gas optimization score: 10/100. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x1595a5393c9deb74c0eeff01d7c05d5b85e5707c 0xe8a9b426f193e361fa3122bf7a87f9f2c913b993 0xcf5971dd67fab8ecee889d412847fc9988bac31d 0xe3a4faed48a61cdc9aebadd170c7f70630bbab16 0x14fb63f7a5ceec9ef1bfd7f5841b08d729287ac7 0x72048db199d44da6cd71e862b92c2d156cdee20a 0xa8f5533ce84208a71bdae9a12974d6d226944d61 0x5324e2f61987fcb06d892f1256b7c12ca9152a10 0xfeedafee395737005cc6529e9c3c602fbf384e4a 0xcec7434924a56abe642162fbf19a0c7a071f20bf 0xbb000247716d1c8148de6e02ef5f8270143a1ebe 0x2c299f20fe4dacbe6ab461eee7c812dbb249032a 0x1d87534b54ab41c7c3b30a99609af434da75ef39 0x65231a38eaf16b9a40797339f183426d6658e05f 0x20c2c40f0de80d98e3e2d3cba3e22af67daf6f85 0xcb376efddd4c63fc74082f1a9926d076d12fb56f 0x8f7b2358074c648bb1dd12e7dd8bbe60d4f77ca1 0x1b86a37af93b456547bf19bc9267d60f0e989a47 0x2d57573be7a772e5f6fdaf5e16500e55e09ce684 0xb42982725f674c29192918d38af911c316d44dba