ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-96D8E80D4002
|
Infrastructure Scan
ADDRESS: 0xbeed9c9d9d782f978030a2a34e4b3e3b8dbb02c1
DEPLOYED: 2026-04-28 18:16:47
LAST_TX: 2026-04-28 18:41:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Connection established. Peer count: 91. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Analyzing visibility: 5 public, 4 private methods. [MEM] Snapshotting EVM state before execution… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Verifying ‘require’ statements integrity. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Security status: DEEP_CORE scan finished. [DONE] Report exported to IPFS: 3c87c72d…f6de41ee.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x118c6cb8c48f58c704512039c2bb3a169e482b50 0x01fd627d7e9ee78b15429ce1f594956b6e48bbc6 0xe6741f7947ea2581413f84db617bf0e3dcdadc49 0xf234bab4f7f78d166d31d1cf5c01330f75477d4a 0xe5f9db89cb22d8bff52c6efbbac05f7d69c7ca12 0x0df51402988517194a01e90333dc1a52b5ad297e 0x0a778f71c90bb38deaa3f399c4e9d8823db90cdb 0x43096dc1f25a640b987e7dbd83a931f8921d6acb 0x72df513dc450f3ca82b962b52c89ff53be32cce9 0x81c1533a3f5fc613f4ca2bd626672bffcb5f8e7c 0xe882835a56bad043995e858b51a012e823900036 0xbdbea55bcc9ff0533d749c1da9d369e71432f186 0x6d9af78a7a8c25d5599d59eda5437682e8c95a40 0x521a2ac87467d1f788a566f81bbd80623c5fe16d 0x150e2c60ce9f019289033a2bc17e1b6db0057030 0x3e5c68175c8f6de891e0d05788adf53923b834d1 0xf5f87f15671d0005da48d94008aee486773781fd 0xee7c9421fd85d9b0050c59276564caff868c6301 0x35029cc5df213216976462b66d07b405f447a0b1 0xc5a528780cdfd7b01a5742352df31586f2809322
