ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9812619ED3A8
|
Infrastructure Scan
ADDRESS: 0x324315d5242d1fe10951b4e96ae2c1a88affda02
DEPLOYED: 2026-05-07 17:24:23
LAST_TX: 2026-05-12 02:39:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ELEVATED_PRIVILEGE_RISK
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Fetching raw bytecode for 0x324315d5242d1fe10951b4e96ae2c1a88affda02… [FETCH] Entry point found at offset 0x471a. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Virtual memory mapped: 0x0000 -> 0xaf41. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Testing edge case: Zero-address transfer… [TRACE] Bytecode segment 0x72 analysed. [VALID] No critical memory leaks during simulation. [DONE] Log signature: 3b1f28c8bda8a16c4fb65088225152762c96634c83f3d596c05f9887fb28a58e.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9ed578831ddf3246731ef74e992163631cd010b0 0x1a6ab0088ae065052cc7028218582f5dbdfdbe76 0xc87aaa2a9a99fb25ca2764e5fddb34eaf5d88b8e 0x34f3e511fa058b83f6ba03c6dbd2c78d607856a0 0x2099b8d9b89712114beb969322aa6362e76f467a 0x1d42de6ae76f0ead52d559184d7d78d4ca023dc5 0x6d0113dbd80693a94be3dd2ad0a1aa109709bfdf 0x2858d0b0ed969108d8c56a83ae3595ca9e9dfac9 0xfeb3804761fcd4483280e79b3ad180afe06b6f48 0x2dbca730d7aa430c81c90f277b3ff58bc512171d 0xf35ad0bc6e7bbedfc2bc8acb18864b74dfe3d547 0x5b7c1c4b31e68ee95f6137ed8ee15ca62e6880d2 0xa68d1358ee50400e7d7220df7a74e95c12e99052 0x894ea0e40dfa7f797708d0e6f957081da35cdb2e 0xcce5b91658133e8b13feefc6987a43db596cb1fc 0x3ae55830bdadb546f7035013f6240d6cd854f168 0x084736771df29d99915c9ff5e781897a0eb6c532 0x9f3ab1cb9c84c6025f2ae275fcd05746db67a1b1 0xe01c97627bb8ac19dd91984a6d2ab75aad42d044 0x0b80b54d7df64f6f8a82f84ad4d96a455fefc9d4
