ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-860F8FCEEB66
|
Infrastructure Scan
ADDRESS: 0x920abb09be0abeb9140fb0c69a7cd523b65d2aa0
DEPLOYED: 2026-05-01 08:50:35
LAST_TX: 2026-05-02 21:55:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0x920abb09be0abeb9140fb0c69a7cd523b65d2aa0… [FETCH] Reconstructing ABI from function selectors… [SCAN] Identifying function signatures (0x0265f4fc). [MEM] Tracking pointer 0xaebfdba6 in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Simulation completed. No state corruption detected. [TRACE] Bytecode segment 0x52 analysed. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Triada-Engine standby mode. Load: 4%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x5c6a1d40af115260a12312584f0e5c5be088eee9 0x1a583a47a516ef525ea8fef3a9b5f4b1a0372e6d 0x2b0b064fdac07ca2b60f5ee5a5b9a2ed22846239 0xe77d67a6a31e9a0629f0c9812ebaf2a4c8e78a6e 0xe2d7852ac1b269f3d4fe1b32c7a71cd2f5eb2d88 0x255da6425bbdfe93eb194d34f6f8047dedb1d9ae 0xa30091c2d95d8e69bbf2650b9f140610c4abca7d 0x672c0c07f003de45e749ef25bba2e68f82885368 0x44fd0ec28ecc58f412675e97ee03dd16da518f67 0xdf2c679f5b40373016fce49702f1f354689e4007 0xce82d8e5ca57297510599de72e5bb592b40cff08 0x2202dc5a83830c0e8d49f85cd7d8d8fc4796b1ed 0x90e308255ffa454ccc42223f521060ab5952b62b 0x54cc600c9082d38c946ab7234e906a28c4548387 0x9e06af8f1bae9865ac73946f6d66920197082174 0xea56cc527f2db3236e03c1338c4f806ed00ae9c7 0x5b2f72e4e130fe104e141ad42bf8b5d9703a2b87 0xa04a49d1a54f12fe3e3687bc0256c0805f8a41b3 0x311fff85d9339b5c6134a45224ccf902885443f7 0x1499c7b5c5fc4fb9978da667e234d0d5a5f3a172
