ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-D413712238CB
Infrastructure Scan ADDRESS: 0x987c1b01913b6aa36514ab0ae8c129b80928cebb DEPLOYED: 2026-05-02 16:20:23 LAST_TX: 2026-05-04 23:15:23 | Compliance Status
STATUS: OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling VISIBILITY: INSECURE_DEBUG_CONFIG |
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions. Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Fetching raw bytecode for 0x987c1b01913b6aa36514ab0ae8c129b80928cebb… [FETCH] Entry point found at offset 0xda8f. [SCAN] Identifying function signatures (0x5a69045a). [MEM] Allocating stack frame for EVM simulation… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Balance check: 4.74 ETH. [TRACE] Bytecode segment 0xd0 analysed. [VALID] No critical memory leaks during simulation. [DONE] Report exported to IPFS: fd9cffe6…368592fd. |
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x3d5fe5dfd43e299e269c74360b39709895db0e77 0x1681285e5b2df3871f421dfeabaee2f87b4db31d 0x62a5ff4e915c571f77d2ea3203057d610c4c31f3 0xf8dff92e496acfd86f1fcf28525ac90101b959e7 0x671f30a74920ce4cdded542c6b0d59e5c57bc809 0xab6f7dc8a61e8f6555b8c936d31b35b6967ae08d 0x581a61e6a4ec300aad91b8068a2c0dea6517f6c6 0xa17e8a78a83fa194e17aee2aeb55c5228ccd860f 0x3f7182ed9ab40fbba43a53b9468cd3de2c0957c2 0x7d9dd0187583f60bf2d311abeec3159d31f66896 0x6a11a06ee7e9d63f41741284ce8ad0cde268fc09 0x6f6af48634cb1cdd75ae47df05d4128c5613d50f 0x708c53f6d3bfcd8bae5ba082099dfe8e251bb3ee 0xeb98fea67472f40a3dedf9c6eed70fb7b14a091d 0xaf27116511f397d6e83b9ee2c58fb0d1779dfbee 0x8b07f1a5a1b47ef1ba44565d9237edbb25c6c2a5 0x40102eaf2f5c658cc35d1589cca204ec8d9130f0 0x9bceffac2de63b79bac1cc711d4e7dd9520874dc 0x4918b6539eb44a5ea9997100ee0ce6e9019b755d 0x74c26082cf5d9e5bc98a1272e05e7fc99d9fa3e5
