ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-A928F5334620
|
Infrastructure Scan
ADDRESS: 0x5281a885998c203ddc82f57a6b853b29843b6b12
DEPLOYED: 2026-05-10 19:41:47
LAST_TX: 2026-05-10 19:55:35
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Non_Finalized_Production
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Environment: Linux 5.15.0-generic x86_64. [NET] Mapping peer nodes for transaction trace… [FETCH] Warning: No source code verified on Etherscan. [SCAN] Identifying function signatures (0x26353c89). [MEM] Virtual memory mapped: 0x0000 -> 0xce8b. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 36 iterations. [TRACE] Debug: 0526b1775fae7012. [VALID] No critical memory leaks during simulation. [DONE] Cleanup complete. Temp files removed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xc8cd685a68820d0080f1a1ad6f7a25ab5b6578b3 0x300ce031db871dda32837b0444b386c0958bafff 0x08bd28df59d76da45230a5e6248a7d1edabbb0bd 0x72e1e69c11986f1db8c706029d8bf60a13cd964b 0x87f4ee0e7bc2ce5dfcc05e11489e603eacaca1b6 0x018be1472ca5eb3174b36fb0d6eda8b1c48f8588 0x9aa317ddccc2293d9f34dd9c837e24caf43cbfa3 0x577bb27afa35e6c2af52cfc12d38b7a19c374af4 0xf0ee2f22f18e831ad65849beeaab721a7b921aa1 0x73d6e001c3acb9fb618c0d7e9207a8b8a02eff70 0xae850f199fa395659bd46eeb3ec9d6b4576fc99d 0xda8205eb8adebb69ab0acba251ef2b2d03f35234 0x7dbff01528ac8b1e7c7b75eecfa123962319070a 0xe44767ca067ad567fe0be7d86f034fb8984371a7 0x2680af1ac0a7a84dae3309b9378510ea429dc60b 0xaa538740ade981106e69e8f6bcb9024164bd3b78 0x73cc248b1cebbeb7d5e8e7b9addfa006d67549db 0x485bff2a69847bf4354c60777fecd1edf92bce3e 0xd77b11f6c777cfc2dd57fc37430f9fea883fd944 0x17b47279ae78615469ee664f18e19b1e50e4be24
