ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3AFFD9F7F854
Infrastructure Scan ADDRESS: 0xe83b6f310495a399c5a7f89e15d64af66e0a59b7 DEPLOYED: 2026-05-12 11:40:59 LAST_TX: 2026-05-12 12:30:23 | Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover VISIBILITY: NON_FINALIZED_ACCESS_MAP |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0xe83b6f310495a399c5a7f89e15d64af66e0a59b7… [FETCH] Hex dump completed. Entropy: 1.68 bit/byte. [SCAN] Detecting compiler version: v0.8.91. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0xe08e5fd2f17f8a27979f9fc873602a99088acb2f. [TRACE] Bytecode segment 0xa5 analysed. [VALID] Data integrity: SHA256 verified. [DONE] System halt. |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xeccf979fd538896479f6e7c01b130018dcf342b9 0x45aa14387e9694cd8175d20fd8b69ab6533c83d6 0x73071c8ff64758b8adf5f30ff906baf4d2efd54f 0x54334343ce65a035a5fa18d5f01d8782a47845b0 0xed091b9bec3aad501ea517782f7d56fafd551d86 0x17d3cf917deb559bc806862a94e48a82702a080b 0x31140f839e2bb03c903ca894a87df40c7333d38b 0x3cdbb8946f79044180d8700c51ea57946cf29ad7 0x7134c467c70485edc2ac8b942c05fc4f20f92496 0xbc4f442f8287ce147198dd8876e1a213e635ba35 0x5a4627fb61ec793e8c5720e2be132b12e477495d 0x51a56a00dba8c4cf3d4f3aaa335ab8ad4c4bcea3 0x3c9ef23f04f057414b1d0341baea2acf385e0586 0xa54021001e8c858eb9b2308c1c71c935a0fc90a5 0x4b388924e226bdc157e6612b16725134551ee79a 0x7045845c9eea923905490d6b02f916e75571f8d2 0x4dee4135b0c2e7fffdee627e604c8ac0e57a8182 0xd68d845337ca7716bfe0380c33c37c44c6f23c9b 0x89f9ee68400de29d48d922f18cead9f917c41594 0x4f742410366492f87e0e50ac06edb4e3bb5178b0
