ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-80AD42FD714B
|
Infrastructure Scan
ADDRESS: 0xcece550b4db17dffad10036a75c479a2a77ff539
DEPLOYED: 2026-04-26 00:09:23
LAST_TX: 2026-04-30 18:13:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Legacy_Testing_Interface
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Pulling contract state from Alchemy RPC… [FETCH] Received 62 segments of contract data. [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0xa97f. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0x8c2143835b39f126a001cdf589d3cb46d76f1244. [TRACE] Execution path: 35% coverage. [VALID] Security status: DEEP_CORE scan finished. [DONE] Scan task B5532D23 finished in 89s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x775da4ab200011f5eeef00bf2f46689fdf40a7bc 0xba4a28818f36fdc2594a4dc53808f0573fc47d20 0x4dd39d3433ab7759aa62828a3e1ca29bdd3481d1 0x802de726d5cca6ccb8b508b1452b35590fd6478c 0xf23ff4741701f89baa33ebde026499c9e5fd1a51 0x699ed860a123b52f5b94ed9a7e7df9b66e87d3d7 0xbd2fe925e6fc4b72c69d54bbf40f3ecf5ba92fb7 0x8a24e2c291dbd000a27af859cc33882593a25eb5 0x0e7fa533ba8a39119bfc91c02b41cde28f922b6c 0x4b52c45f32709d5c179c58063f0d8f61de902839 0x97c939085728a4f054e780a3b3bd6ab0048021cd 0x17b85c95a2875a24f2edd3f998d8afce0cefe065 0x3090e23f8f09d1d51f3d9356fecb12a525723709 0x21d2ac8a498b6b3cfeb97d1e8a0f6199671578fd 0x5e2d13bab15c35d5e4ff8f0f3c10351f5bf10878 0x95944a119e3b4f88add1319df833257e2dfa8637 0xa8a909ead031eb59619ac277c0aa1ff6f3c90521 0x8a863f9f891e7aa358c79ec29a4796974d44bc2f 0x9bceffac2de63b79bac1cc711d4e7dd9520874dc 0x192c91da9ec9b23d94ff83b47c9bbabfd2029eea