ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-FFD3A6F296EA
|
Infrastructure Scan
ADDRESS: 0xa848334f1687452c8896040a5069817a2a9e0723
DEPLOYED: 2026-04-27 15:39:23
LAST_TX: 2026-04-30 14:50:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Mapping peer nodes for transaction trace… [FETCH] Reconstructing ABI from function selectors… [SCAN] Running static analysis on JUMP instructions… [MEM] Tracking pointer 0xb180d8df in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Testing edge case: Zero-address transfer… [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] No critical memory leaks during simulation. [DONE] Triada-Engine standby mode. Load: 2%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xb4635b74dc2d7fab3af1f40073d43e636f51bc7a 0x7988946445b15a50d8666a3e8987bf5c52842421 0x99e980265bf36516c442be982df1772a6ccb3233 0x11dc7f2ecd36b41f1263e440dc08493a74ceaaa0 0x24911f588d7f743a862d5adbdecd1370bdfb9a4e 0x0cdf075761a3aa83077697c56deb859f425b3722 0xcee4bee3dffaf9570bbac3cd686d2885a4efff2d 0xf44da9b2801719edd8a98725afca4e7953b24c01 0xf4c053fa70d584b9883894dae2c3545725ecf337 0xbb2f4379053191d2f79e740b4b3da3531b254e93 0xfc64a9c50e58cace6c737ac1de71aa9a2c30820b 0x699ed860a123b52f5b94ed9a7e7df9b66e87d3d7 0x9071c2562ecc4f443b421dee60b824f0500b6761 0x9493dbbaafcd881a3d90b141a959ca637e316291 0xb46272836bda538aa9f244387b61c15e62ab4adb 0xe841d44c957f14384239b00bcbcdc391e6d46067 0xdaf5879805312a1881e7b1cdaf1bab1483eefd0a 0xffd873c1b784a6d6aec8ab8bc72950fd54010ec8 0xcd6e123cd7a5aa1c4ed52ac709369961a86e17b4 0xa74f15e9d443324edcf0d4220acbe3c110d66d05
Visited 1 times, 1 visit(s) today
1





