ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-BD8F0C35CB6E
|
Infrastructure Scan
ADDRESS: 0xfc9c4888bdf12881e08c115fc6f23c6a09876829
DEPLOYED: 2026-04-29 19:38:11
LAST_TX: 2026-04-30 00:26:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unrestricted_Admin_Gate
VISIBILITY: OPEN_ADMIN_ENTRY_POINT
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Booting security kernel… entropy source: /dev/urandom. [NET] Connection established. Peer count: 71. [FETCH] Hex dump completed. Entropy: 5.64 bit/byte. [SCAN] Checking ‘immutable’ variables and constants… [MEM] Simulation buffer: 1024 KB allocated. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] State change detected in slot 0x08. [TRACE] Call sequence: 7d6d -> 78eb -> 1493. [VALID] No critical memory leaks during simulation. [DONE] Memory buffer cleared. Session closed.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x454168a93bb4b6e16810391109e31c34768ae396 0xab6f7dc8a61e8f6555b8c936d31b35b6967ae08d 0x6b88f0434ffeb1162c9f045e4ee0942d38d3e3cb 0xfb3f8971309b6b76fb0a40b849993592d9cf03fa 0x27f71b618548f39a61c8bc19ade8620cc4aadb94 0x222fc1366a01973d788575322fcb53ae1954742a 0xd1c0763da7ab2878195d7821befd9bab9841aece 0x89b6b0ed44a67c9f0be6584d86eb323d5a909020 0x7064f0980fc57ded5862dd90dc0e73e6ddc3ba16 0xc61c037758b5bd07a8c6290b4c9302afdbac846e 0xb6e5cace2e50566d1df7cefe1e2ef156a2082197 0x907ee09f061990654219bbd5d90d6bd52a6b4bae 0x079f52f230db088617869fb836a0572a9b055b24 0xa9ea746d86b2f7d43c163554f486b60a2e9553a2 0xbd4921cd159618774061fb15ea6d276902df4173 0x1f701cefa04053f23f9251e625273fade92b6f9a 0x00e610bc4e73a6ab3e8703f03bd13e0a8b2e7619 0x55f7fc05a8cbb6b8b5cb3b172f2321016d21f476 0x4c808860e0fd5a48874366c07e8eb3139979778a 0x08f5d3a621d2dac9da87ab2dca00f1fb0229a386