ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E55F7FA7C406
|
Infrastructure Scan
ADDRESS: 0x78ca083aa1112d7c35a2a6e05950b62383839e94
DEPLOYED: 2026-05-08 03:37:11
LAST_TX: 2026-05-08 03:59:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Requesting storage slots for offset 0x00… [FETCH] Reconstructing ABI from function selectors… [SCAN] Analyzing visibility: 6 public, 1 private methods. [MEM] Allocating stack frame for EVM simulation… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 93 iterations. [TRACE] Execution path: 16% coverage. [VALID] Generating cryptographic proof of scan… [DONE] Triada-Engine standby mode. Load: 4%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xe579363a80d3068c78f54d56b791c32c8ad52f1e 0xec5545c87ee4f74d33a4af6f817a1b6eabf67852 0x9a19f966aac0ffb9bbca57e46d236ad8848ff978 0x53d812d899e5b3e14566487e653f227904c615e1 0xfa60789b78a7bebfd7475104ab9b223b7d7e4eb4 0xc7e62387a40b83e3519bdaf2be59f0b25794c54a 0x5f756ce77bf9c1e1c64ade86350fdf790a4e802d 0x752f5706d1ee7fff0499ddebbb5be0c2a934d9c9 0x0c8c8252331b5df2a64537a3b1511cfbec3abfbe 0xef52b4593eae6e0cd14b9f88282a5826fe9effa0 0x005356745f10d80e3c0874b8c0ee7574b81763d5 0x98f9cf6b9bbb9932efaa428564ed6a093c140866 0xc4a3be72696aa24e3e95c1c86b3a1f7046b814bc 0x71cc0ef9c5912dbf02eea2fefb3c091f1eb2f7bf 0xa854986a526ddabd7a6f3515a9e9f9f052b1f90b 0x97eb141af7d9b113b6ced91ec399b37a5fa71e5f 0x37a4ba142616442eec754a19742faa3121b5798b 0x6eefdb96e58db39f137d397620785d33920bb4aa 0x76c162a9355ad7758625fc30f2abb613fa005e66 0xa8a19f409149d6207c87098b82154a90f2dbfc6b
