ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-4FACF65E3770
|
Infrastructure Scan
ADDRESS: 0x92d8a5f98373d87ab28f49292fefcb98a31c75a8
DEPLOYED: 2026-04-25 21:06:35
LAST_TX: 2026-04-30 00:40:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Standard_Compliance_Gap
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-CLI v2.5: Secure connection established. [NET] Handshake with node 0x055d7680 successful. [FETCH] Reconstructing ABI from function selectors… [SCAN] Searching for ‘DELEGATECALL’ and ‘SELFDESTRUCT’ patterns. [MEM] Gas profile: Opcode ‘SSTORE’ cost analysis started. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 14 iterations. [TRACE] Bytecode segment 0x33 analysed. [VALID] Comparing result with Triada-Security-Standard. [DONE] Scan task 57F7D8B1 finished in 46s.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xa6d0fa6d03ebfa679cc8f4f1d048acee54f674ba 0x71c1b46c4287d85e61a1cfafc7ea3608f7495797 0xa270d2fe6f2c8e35b1efe6b0e66df38f750af50a 0xe3ce350d938b02cb3e226a58151332d322686a99 0x787b52ab5b5321167868ac24d48e7e3e1b793957 0xd4533d427fda6ab40a398b6570599058bb2ee053 0x877eb220413814a9a194218ca83b87ef1035b1bb 0x52b4fb46d5d2575474de5670f86f502fd919a45f 0x518f632657ef75d5a2b68049427eb58123a114ec 0x6d3b98454cb51a906f6aaef53e5123f6b8025af5 0x3abb55ff347f14b8ab141006ca839847787313b7 0x509230d98e8cdd8c4a0b7263da3372c66814e8f2 0xbdc29d870a3eec1f1131d38d626509e39d837adb 0x723f7144951474de3d2d9482d11f55556e6f047e 0x5be42db0429c2eb657582e02df9a83d53da2ad8f 0x311fff85d9339b5c6134a45224ccf902885443f7 0x8c85e71cd8101f2e5494e734d00652ca41f933fc 0x98c48f58f153a25ba0fff3837f2f5ad3487cf549 0xf929f89ca906957fb035572980b6c55054dadaba 0xd1eead55ccf13e143abca8a2a8709cae516ef6ae