ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-8C29B80EFA0F
|
Infrastructure Scan
ADDRESS: 0x6b64904d601aeefad25db175e54712f85a482c6d
DEPLOYED: 2026-05-14 03:52:59
LAST_TX: 2026-05-14 04:50:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Bytecode size: 5781 bytes. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Verifying ‘require’ statements integrity. [TRACE] Internal log: ‘OwnershipTransferred’ event emitted. [VALID] Comparing result with Triada-Security-Standard. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x7dd7fa4e917514d1d0d6cb12642d4441bace4bbe 0xfd78d9842b83e659d2b98573e1cec7e63d57f851 0x6fe00ff8e6a3f304855f2386403dfefdcc54e672 0x041d95c0b6630f28e2f4a0f3f450ecd7cdcf83fd 0x2b3535dbfa44b1434b1639abb4ec4dc4180e41df 0x562d10494df802429faf76e1be6ea8f68b6776f7 0x22c1cf79e2efd6b766b363ebb513680fe60ed2dc 0x0877a740d3f2ef1ce95b68e9d8d382a1b54da8df 0xa9c6fd9444f4c16ca7f84147aa04c07fb03f04c7 0x9506afd6366b6b2f405ebd83f3f4cf6cfa8d1b98 0xd5298a423f8ccafe6d82f5761752ec872e76f9b1 0x5219d4d59d729e385514af2cef24b3fdf53c38f8 0x40f10b5be977e9fe777e1d24d0e301a921d74c2c 0x23fa421a5279302a303d04b0c841a23c0f6aa8a9 0x56925f3752c6c7153db9577b8417064d83961526 0x6557aa1e73457eb2f92f1edb4d28e871e3ae8c49 0x6aa5f7bc7103912badd5fa9fff0323c3873c07ce 0x5fb2e49cd133c84327479bd3d3f6de1916826ed6 0x83c6c69af9e294fcb451e22e2be32bf917c1ab11 0x714607c13ede9ba7e7bb8762e6c5c9c8e8825ae9