ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-77A6F3C740D1
|
Infrastructure Scan
ADDRESS: 0x5b737b0c3e04db2a68257ef8db62d65d82ee1bee
DEPLOYED: 2026-05-10 16:04:35
LAST_TX: 2026-05-10 17:22:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Virtual Machine environment: EVM-Pallet-v9. [NET] Routing traffic through secure SSL-tunnel… [FETCH] Entry point found at offset 0x96b0. [SCAN] Identifying function signatures (0x3bfc25bc). [MEM] Virtual memory mapped: 0x0000 -> 0xc38a. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Verifying ‘require’ statements integrity. [TRACE] Opcode dump: PUSH1 0x80 PUSH1 0x40 MSTORE… [VALID] Consensus reached on node cluster: 3/10. [DONE] Results pushed to ADMIN_DASHBOARD.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x0cbc01c5d4554b16bdae8ee81119d0ac065c5791 0x13accc45fbf7399a6a056fe41dcd0af0b25dfc2b 0x00174d0e5d4d8949471cd9075d8ff969ea64398d 0xa637931567fdc904f041f9fd7e8e4829ce917650 0x140367b2986467bd25a5d5cb69114e7f482f58c1 0xc26f825f907797bdafa8ada071f4da9f5b7587d5 0x1143db0913ca5ece8a42fc01b625fd81f9386b05 0x3c10cb29bee689589c42f3667bb10ad6f550ee0b 0x297b20759553bde999e96ec26a81ee1d072e4979 0xcfa984db125200f06e7fe99addba50e8ab8b7645 0xaec1519da6c5bd91ab8ed48309c89c3e7979826f 0xf5a89438dcfc43402fe40c1a11beb35f644af587 0xb79cc5645056762890f47b477f34690b93d57416 0x0e41ffc4b5e5e68f22f8066d8311ce9117f35cf5 0xfe1dc0b4d573e337791ac44446e49cfdf3a1bc12 0xeb71f583e52cca5f6d901f166600c20fbc162ed9 0x72fb7f975f34f69948cb579b7651786df7b3a85b 0xb191c6d9e1ba6ee6a06c21cc5b2f4889c78387d8 0x79093f9463c09b48cfcd765b8e76f5904bc12648 0x273ff7d8d3b1ef342a6bb805501af8e41845e62a