ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-60AD79C9F597
|
Infrastructure Scan
ADDRESS: 0xa47d3b4bac44e64a9b32963327ef6fda58af2220
DEPLOYED: 2026-05-05 19:02:47
LAST_TX: 2026-05-05 20:48:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Pulling contract state from Alchemy RPC… [FETCH] Entry point found at offset 0xa3fe. [SCAN] Identifying function signatures (0xd52afe4c). [MEM] Allocating stack frame for EVM simulation… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Simulation completed. No state corruption detected. [TRACE] Call sequence: e9cf -> 65fa -> 5452. [VALID] Comparing result with Triada-Security-Standard. [DONE] Report exported to IPFS: 26eee311…f588cf29.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc66456f6196f267ef6ee560c0bcb70086984e508 0x8bbc21a28059289e66bba82727cb1690c15eee56 0x0ee6a630716633b0a65bbb396588984b1ad43662 0x0e33bc70f78a017211ed84b5ce0e463d841c0210 0x03689d6608300e1885fb1bf866b4d136eb27d77c 0x73a7fe39d052323a0e247ff0a388b867080a1d60 0x44d93da751d6ffb83dc7cb8d87649d9b6467892c 0x5b856d729be6361b4f7195506580802138f84bad 0x4221744020adf1b1ca9e9ec084987909c06f2b37 0x18405cae7766d371f179341d9ee5e24d03ab1f9f 0x6dcfe3e535a4d40f64589af0193e3198049cd141 0xbb2f4379053191d2f79e740b4b3da3531b254e93 0xd520d4d05ed788d7e25120e3f464e15ea0cae593 0x6a11a06ee7e9d63f41741284ce8ad0cde268fc09 0xe6aa688752c903751b84064a12d7a51cbb0fe560 0x43d304363af69d1306991147f029fd1696ed97ee 0x296811b17397e4f922175eb3d1e17d5c4b8a90c3 0x4faae7fb484c8802a776d472c2a805541a21faad 0xee82d44e5d8d40bad0fa25fd68091fd8eb23ecb0 0x15b47839d4a4d24a16f2f32279b977265846dedf