ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-1AB69CCF1610
|
Infrastructure Scan
ADDRESS: 0x353a8885a14bfbdd9acaa6b524e53f7023b99411
DEPLOYED: 2026-05-11 15:41:23
LAST_TX: 2026-05-12 14:05:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Mapping peer nodes for transaction trace… [FETCH] Hex dump completed. Entropy: 9.66 bit/byte. [SCAN] Mapping ownership-protected functions… [MEM] Garbage collector: 0.29ms since last run. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0x5cf63b47583d6f8eb254180909f0b3c974191cc8. [TRACE] Stack trace saved to /logs/TRD-9288ACB2.log. [VALID] Security status: DEEP_CORE scan finished. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x471ed4aed5c10f021d8fdfbecf0c2b709db896a7 0xb2944f8f9b275306cd6431834ec139e6c8d0da4c 0x4b55f14f38fd355cb28214c4a8fd41f8db54b957 0x453f162621436cca389f4b7a2273f43f5b58da23 0x4e44eea24f778e35e2dc9a3d6339d3b7fc5e5370 0xbf14b79f92b61cbc6e626dd9fba8016f69169ed3 0x5b7ac6fe8cab5e58d110746eb538a51039a5671a 0x99447d0cd1cf2476afe8c49b505ba215b9bf1cbe 0x9185bee1d483bf7169cb6f5b428a7c30ecd3f8de 0xf0fdb83473d39b51c7692000af1dbd800664881e 0x2dcf0ea99684bb3fc4170ffaad133b01f4153b28 0x4564035522c0c8d27c714e965d2a497b12f47181 0x30cfc8ac2110cf1533fa49d9812785c57c5a1699 0xb8d40d0c9d19f5170d9e7843fb52e9742f847178 0x1a1a6c3a10e3805de4fdd8939a36df849afa9675 0x9d73d1152422872375eced7d8bc872740ece6b7f 0x287671ed3c8ee327519a7d3dfe3027f290cfeebf 0x6377afbb0ded9068fbe0e2b8dc33ab880f9efda2 0x0246687070d924c7585d2c76e12f255dd5464293 0x2568b84aeb2c09457e7db2d5cba425afb6460e64
