ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-2E45B0C41029
|
Infrastructure Scan
ADDRESS: 0x26fc30c9ef11057e6e287beae799d7b8f8725d55
DEPLOYED: 2026-05-02 08:07:59
LAST_TX: 2026-05-02 08:19:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Mapping peer nodes for transaction trace… [FETCH] Swarm source detected. Downloading metadata… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Tracking pointer 0x6a89ffef in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Simulation completed. No state corruption detected. [TRACE] Return data: 0xd4983151… [VALID] Gas optimization score: 23/100. [DONE] Exit code 0 (Success).
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xdf4f3454a90fb0226dbbc1b80340289d147a4c07 0xced30b471d44551a4b42d599802d0420119f49c2 0x0c9564fdc9f3b3758175f60fcdc624059caeb4eb 0x4c0831343c4b387a77824989fc2b7fd534441e9f 0x5a049cec11c664f642c3e7d1f564aab6a9dd910e 0x8ff9df483fd5e5d2afb0fde233f742c5be0a94a3 0x4d18ca8b6aaf9306276f0982d29ea76db516e064 0x26186d82d915edfd0046595cfed90d5f5d1b7f1f 0x76a4d247486d0e74f9e2a77a958ff171ecd61c3e 0xd113344cd95dc8298005171187a38e9ac06db54e 0x28dd48f471cae3be1f3c335748effee79aa6d66c 0x72e74fdb097abb6734f83264a6d84e0f0c55827b 0x626ec6315f9bd410f53ba8826178971fedcf9a82 0x4dfd04511f2a2f61edee55828651bc8f8c734e47 0x7e53fc3c3bf87230813bf5b16b9cec2930be5c5f 0x6e31fae808a2f217c42b88fa5be925e4dad5f0ba 0xa9d6f47727fc459f60a610345d1a39b982789835 0x3d12b52fd8ec0e63c7e2d2d2acd330dbbe70ef75 0xd2910dd390ed2405a726f49ba33b1011125feb14 0xb5ccaaf508a7a903eb225734f0ca73ec74d386fe