ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C782DE9E2AE8
|
Infrastructure Scan
ADDRESS: 0x144e805a4fdc5b4d20fa26083c127b3786a2883e
DEPLOYED: 2026-04-28 16:54:47
LAST_TX: 2026-05-05 10:42:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0x144e805a4fdc5b4d20fa26083c127b3786a2883e… [FETCH] Bytecode size: 3783 bytes. [SCAN] Running static analysis on JUMP instructions… [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0x0b91ad879ccb07a1ed0987df6d419c9d71d187ae. [TRACE] Return data: 0x7681ebd0… [VALID] No critical memory leaks during simulation. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x81e71bf10fd17845a1a5b2cde9ca04df46b70c16 0x320beff1eaec88ca5606444eb718e7574a3b6f6b 0xb1fe6c86ab012682b68363c79cb753ed952a66b1 0x7676e7bf0735179bd28f6db0f24832175ab6d851 0xf0adbdedf900be25b396369ff0a817dbf505afbd 0xb9e41126f56768d02576c827a96489f36b186c77 0x9ac7e6c4e20cd21cb390f32b586c4af6890b7245 0x1b9730d762bec2f0ee3404e839d0e66ea43a238b 0x4ee52e7d727e19d5cdabbdbf231e8c36d7678f47 0x2f8868b581d9df685fe80be0be2211319a80fc39 0x175b5184144d681bcd1accbf19e860f28d45d41e 0x3662508f16f5a8562ca7eb8b7b74b96c87214eb1 0x073aac7e4f402d8dba2df3260070c4791e498089 0x30499e637829d10b6e96cb72fb42b497d72e6fa8 0x84cddc9f202a5adb406a4309b8fbb04f8e5cc6bc 0xbf154909e61fe360611779bdd195ae83a9c2c0a3 0xefd7dfd35ce93f719127db5cdca38ead42dfcc8a 0x2de8294c4538901ab3f177fe13940735917851f7 0x846c741668f916effc515bef92c55911ddfb8583 0xd1f960d47b93419ca88b038680d0b8e03ccbeede