ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5BE7F49F39F9
|
Infrastructure Scan
ADDRESS: 0x9a4f3e86154bf4ea16a9e2c9613e23d7c1480959
DEPLOYED: 2026-05-17 20:08:35
LAST_TX: 2026-05-17 21:08:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Recovery mode: OFF. Debugging symbols: ENABLED. [NET] Connecting to Ethereum Mainnet via Infura… [FETCH] Reconstructing ABI from function selectors… [SCAN] Running static analysis on JUMP instructions… [MEM] Virtual memory mapped: 0x0000 -> 0x3510. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Balance check: 6.21 ETH. [TRACE] Execution path: 59% coverage. [VALID] Finalizing audit report for 0x9a4f3e86154bf4ea16a9e2c9613e23d7c1480959. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x4635315a4538be8587334fea96eea2f2c14abfa6 0x260ea48ed20f3200f92b384d6ad51182f58c62eb 0x5b78d40b538dfb42772834d05ea6816d6478e11c 0x19f46f30b64e7773e2acfb3035cbd4b76fe11e07 0x6d8d09f18afd74e6d6d0190ccdf89de8fea54206 0xa91f34b781df85a25c1bba6c4ab73c8a442ff09a 0x85d5bc554131c724e906702188b29e1b384bb671 0x0f09ac74ea9cd530a39860adff105ace31e0ef5b 0xf1228380ec6e347ce4a276833f23a3fb63ae00b4 0x9db897ed4b82a6226960fc1efdbbe68001eef8fb 0xf4121f72dc7b3c3dc78e82e5ef9f0e626861763d 0x27491063c03490f8849cfbce134f7cba6503c911 0x376347a052174e74c8e86f15ca8f78a7911efae6 0xc0d55fa1fa59fb4de3da4b48916eac0291ad1be0 0xaeee732eebd9d6e1a206cdc2ddf61dd744b6d3b9 0xa4ce9600a2d2168a377a99d6a115577b258374c1 0x57a4871f15a79a5f326b6d52e78eb14227765c36 0x32085a25a6191cadab7c6dd0051a0ac9ff84523c 0x7a2f3403fcde4596358060819dc94c9c20c822de 0x719de6822c00a69db214cb4d73b59ac1e1ca6c09