ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-C2A0149F3C98
|
Infrastructure Scan
ADDRESS: 0x18ff5527a0ad753e31e04ac53d73bbec0144d186
DEPLOYED: 2026-05-05 16:01:59
LAST_TX: 2026-05-05 17:50:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Fetching raw bytecode for 0x18ff5527a0ad753e31e04ac53d73bbec0144d186… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Identifying function signatures (0x3ab9353c). [MEM] Snapshotting EVM state before execution… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0xff. [TRACE] Stack trace saved to /logs/TRD-6C85B819.log. [VALID] No critical memory leaks during simulation. [DONE] Triada-Engine standby mode. Load: 1%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x97eb141af7d9b113b6ced91ec399b37a5fa71e5f 0x4efc52056392573d8e9f1c17e15fda747814903f 0xcb1e1c3a883800e906d8350a44404d4d1dfc4d17 0xcf3944e834135f1842c1d8a2633e1da51be0b24c 0x509230d98e8cdd8c4a0b7263da3372c66814e8f2 0xc8a39bfd71d82abca351dcf67067691e14af8dc1 0x7d62604237b46569c9817e3044e8f67fd9128aff 0x67426fe6233897d6c7d41fd20c4cd84ff2ba7561 0x62b4aa4cf726a466853fa550b067c4019790ba37 0x4adcba218e3f6615c642b4ede6c22a7229330e33 0x4b6a5f11e30bd2f4da8223f26b3aceb40830ad63 0x2a152ee9fd67248c9654055c989fe5d58dad0b1d 0x12a9a14e052c8114775c8718855ed9613eca7a76 0xf24f99795d1cb1f0816101d4e0a41a84b44ac8c3 0x9732bcdcbd70c9f70b69786c238c49fc932f72ea 0x90f4ef866d58cca5166c6401848e573b7742cbe0 0x665745b7cf6c1bb287468ba836692bfe7ad1b968 0xf1f1cadb1a4614107e06d6c4267071d1436153a7 0x4138609a2699b5543668beec2a114d9d8e61a1e8 0xa23f6e991ac2a56c412909dfdc86f1d513e6f714