ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-B3D1976DF7CA
|
Infrastructure Scan
ADDRESS: 0x95ac426d657726b260a99d4c5ade5a817301fe8d
DEPLOYED: 2026-05-03 08:55:23
LAST_TX: 2026-05-03 09:35:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Requesting storage slots for offset 0x00… [FETCH] Warning: No source code verified on Etherscan. [SCAN] Identifying function signatures (0x68d2acfd). [MEM] Virtual memory mapped: 0x0000 -> 0xcbbb. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0x03. [TRACE] Call sequence: f122 -> eb08 -> 62c7. [VALID] Generating cryptographic proof of scan… [DONE] Report exported to IPFS: 912a4f38…e5f9fb1f.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3fd2e820bc127f2dc7e1e319ea93871237e5d61b 0xb1929e419be3946793a4bed2c984d3d555843372 0x2436d3a7f00ecd8740fd519e46738791d301ba12 0x2d68a9cd06dd46976f011e524d9b85af388a6eca 0xa607af98e132ae836ba5528a20b1334fce96093c 0x58a354a2865cb04409e78dd85816cbaaf46bd761 0xf4cadfeb21ac02a28ea0c82a64cd4c40930afc01 0xff14fa421384d2b4865be47869d89197d5ce4e61 0x81c37b26797145a4ab56f62c4714d3301d4894e6 0x80fba9e21f275192d84123e28597a7f93d634575 0x35a771c14ecc6fbd1debd0b780442fb9a6fe82e0 0xc360e625f19a7ea47e47810b13e386221d5187d1 0xe1a18c02beb8a20488d645f12c074a6e068bcfe6 0xbc6a8fad383a6afb2fce468f425a68c6ec66d355 0x507ffbe0b0793b5d279b1d3d20331c947e66fd4e 0xa6835ec46c115c7883c397b22450768c1a2d0c29 0x15e78b0980cff7851b9b377fed31295a9af0bd64 0x5cfa54f52aa87b597ee85cc5f7817029ea751601 0x91174308be1d115894a2fb2eacb12a20942ea51b 0xc67627bb554864dee8b5ebb6985094a09b6856b7