ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-5FE28F6CC9BC
|
Infrastructure Scan
ADDRESS: 0x1354e94ee694a8ebbb463374f21bcee5a29296eb
DEPLOYED: 2026-04-28 16:34:59
LAST_TX: 2026-04-29 03:56:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Dev_Maintenance_Leftover
VISIBILITY: ADMIN_ACCESS_VULNERABILITY
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Fetching raw bytecode for 0x1354e94ee694a8ebbb463374f21bcee5a29296eb… [FETCH] Loading bytecode into isolated sandbox… [SCAN] Analyzing visibility: 8 public, 4 private methods. [MEM] Allocating stack frame for EVM simulation… [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Reverting transaction at PC: 5080… [TRACE] Execution path: 79% coverage. [VALID] Generating cryptographic proof of scan… [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x87f0e973a2562d54c77362a9e8cbdd6631d61128 0xb3cca08be03bf867c6fc454fb3b5c5ab49841942 0x7e02c41ec60122629c41ec4bb0a4df6b5b12eb06 0x948ef0e9382ad0206eb06b6102c0d8d9d3d62ce1 0xe934a2f9dae42d38f1376a92e3693123c7fff8f7 0xd26e0669e77f995312c29169b62d71b1d46d19f1 0xcd8998955ead69b8905ae12f7a915fcc83af4624 0x94226bbaa8d5ab3208ce8b1549263bda5778dec0 0xfeedf398124aafeb6a36351c924bd00a361ea89a 0x238399910636f41f351d20411ffae4deb8f2b9a5 0x93b4909f72d3726a503e3521435b44dfaf8ef740 0x7c9e7b25c7674cfbbc989a0991c9b1b61eb262d7 0x36a670000efadb674c9766af054ca074a6116e12 0xf79a1af15477fdd9ca9dade061a855fb67480402 0x5d0e3b19fea75bb684a3f2f02f404b72b2bea128 0x59ec5eee929881d8f864f9066feb8a617561abc3 0x08979ab0e841a340919e2eff17df00d651fb26e4 0x20c2c40f0de80d98e3e2d3cba3e22af67daf6f85 0x538a113b111d87f14b166d4cf63fb956018f651e 0xf4c053fa70d584b9883894dae2c3545725ecf337