ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A9BF3823F737
|
Infrastructure Scan
ADDRESS: 0x5aa4742fd137660238f465ba12c2c0220a256203
DEPLOYED: 2026-05-01 13:51:11
LAST_TX: 2026-05-01 16:15:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Handshake with node 0x03436829 successful. [FETCH] Reconstructing ABI from function selectors… [SCAN] Mapping internal logic flow and branching. [MEM] Garbage collector: 0.12ms since last run. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 72 iterations. [TRACE] Call sequence: a238 -> 78e1 -> 5e9b. [VALID] Security status: DEEP_CORE scan finished. [DONE] Scan task 63B6E371 finished in 69s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xaba1e9df27e06d5b35da3fead36a2c275c1d2f1b 0xdd7347c1bda9d7640305d8833c67ed835022f68c 0x7305891d5bf688822cfb3888973054959b7cddc6 0xcca1acbb82367ac1ce8ab5ebda8f6be8329ff02a 0x76ba1ca3b54e026ad8e9a3ecc55c11b393c0e15d 0x6f0c7270007ea4300c600c457cde94b1194f6a55 0xc105eae1410ff34b2028e8defdc4a945d2b91c85 0xa17ff25db3c61b7a6269db1a37dfed9bf1a19562 0xad05c45803e9f43cfedb8008779fb81c0be2e982 0x030a02cf6d964d82792ca398f176f3b88eb02867 0x82fb4f583cf88d6206af9244ba5304b8627733e3 0x5a1a97b1ef6f22d59b1b1eda7a4926bb121f091b 0xc6ae663f7ac9b22289308b01e372d7531f807817 0xf4054d80f2afb0a2c47265d9fd14cdd8948fa6cf 0xca21c32f1ca1795d36ea04a23f91c274bd06d4af 0xf7fd92f3292bc6e69f22d46fdff3ff3b3c14c66e 0x58742c17f2937b0e7f1fd099712757336be9983b 0x5a9b28455eac61ac8034f4c4fe03c88d912bbf45 0xb8a94d208f2b27e2905eb033b25b0797b0ca0d96 0xe4db2ede61a8ac4041ab27073f58cb79648728b7