ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-AC08BA1743D7
|
Infrastructure Scan
ADDRESS: 0xfc414a0b34f951d7a2670677ba842103920b3601
DEPLOYED: 2026-04-27 15:40:11
LAST_TX: 2026-04-30 20:29:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Connection established. Peer count: 91. [FETCH] Warning: No source code verified on Etherscan. [SCAN] Running static analysis on JUMP instructions… [MEM] Tracking pointer 0xf65d5ea8 in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Simulation completed. No state corruption detected. [TRACE] Bytecode segment 0x3a analysed. [VALID] Signature verification: 0xa4fdbb4fb21bc3fe569da92ad25fef2964d8cb843f3a6c55519c2ace08a1ade0. [DONE] Triada-Engine standby mode. Load: 9%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xdb9a2916476bbb46ab46355a84b6b3cec4b88b1b 0x879510762e3ca97f6124bd523bc31f4854bcc4ca 0xbe8fe1f6dbdc1b0d4bc5f796e1e6d8464448ecb2 0x46f5f18213e5d6419bb053afd9779e4c7bd2df48 0x3be3acb54f972dfe3e4fea5419dc012a589be172 0xf65392a5f42d17d9781d026dae492b0d95059003 0x67f79cd576a79e39ef39698fb3821ad551bfaf3d 0xd9b3d6aaae1dcc0ca21405722077be19b5016611 0x748b22360a55fccf58a18e3a068395cb8ed6af01 0x7bf397dd32a3ae0d1a0bbfb28e333b77b57b9ea3 0x9094eb466f56ebfd6644dcf76943a32c4273e6cd 0x38af0ab796703e2c1c51b3f6286e1582d8e93d65 0xc7787712b17409b17705504c25c50b9ba15ccd1c 0x78099456e4a02bd0a9d73380cecef1cb6e0b434e 0x3c0f929b535563b48274e955a0586d60c592cadc 0x0e6fe36915b4d6b0f00ee707cde1586785cfea8e 0x8e573e4e8a9c4b71a11768f933f95b289a96fd54 0xf957c94763ed1e8211a19c8a73c862df45690ab1 0x913313dcf2d7aac86bc6070e7fb72efe77951d57 0xcece550b4db17dffad10036a75c479a2a77ff539