ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-3C77AFCA4A86
|
Infrastructure Scan
ADDRESS: 0x836729cf447324a8421b07f25208e90b1d8908d3
DEPLOYED: 2026-05-07 16:17:23
LAST_TX: 2026-05-07 16:56:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Entry point found at offset 0x441b. [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Initializing storage slot tracker… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0xcdf0b6d17bf7c755e367d2ca8bc10787e45768ce. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Scan task A33FCB5F finished in 70s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3009b714c39d1303cdec09b59bf4b3f9f8671537 0x9d19ba947a6bf0334a79220279454edbbd2c04b5 0xf0adbdedf900be25b396369ff0a817dbf505afbd 0xc76ba9479b6d700830fd682d56e661a56f311926 0xc5c5afdc824f4ba82be3ca526df6bdf52ca34748 0xa75468d1ebbc0080c550d72561416a4fd5735398 0x3459cc58bd1c3b2e94504bdf869fd2b9142aa986 0xd6cf419e5ec5816b903643bc3e8a88033e7d7003 0xc6ac06c83035c3a59592076cefc777afbd25e6b4 0x27a4c98f719ffb8be66a7f4518696ff0b3d8cd3a 0xc93d7ec5ff70361266bef53778b502155e832e98 0xd02cb6e466ce727a7a8594cfccffc6a1e549ca65 0x1f17d14e35be8d04732b406a834e633691f7efb8 0x206de6c0fd408cb53510d6eebc914927f8ef7537 0x13c9bf1499bf3ffbcda919a0578f6cc8763a2f19 0x92a1893620b395bdc35bbfd04c554345bb524323 0x8e66bda36846be975723337b771b59a4185f105b 0x3128d27d88273272cd101e2729461242ede601ec 0x7006de22430fd25d48ec71afa3a3c0a4be3d1f26 0x8541827e2deddbf33722870f54a789c40c62deaf