ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-9B8E229B6606
|
Infrastructure Scan
ADDRESS: 0xe2ddf470cc4687bb50c438752c0c704111f2150b
DEPLOYED: 2026-04-30 19:52:11
LAST_TX: 2026-04-30 20:45:11
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: UNFINISHED_STATE_DETECTION
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Triada-Engine v2.5 initialized on node eth-us-04. [NET] Connection established. Peer count: 82. [FETCH] Loading bytecode into isolated sandbox… [SCAN] Mapping ownership-protected functions… [MEM] Tracking pointer 0x3d2c81ee in memory heap. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Fuzzing input data for 57 iterations. [TRACE] Stack trace saved to /logs/TRD-03425B00.log. [VALID] Cross-checking with blacklist database… CLEAN. [DONE] Triada-Engine standby mode. Load: 5%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xd335a7074092f3d55adb55da11c8776c4d8b2668 0xfb3ed18bdc058e95f9c50918228387de6baa3f0f 0xdc8d5badabf333dc5db8159d52199654a35f33a7 0x15fcd2383dd6d04f26b0634eb7e130c60678460c 0x69abf663cc4a5c88660c765f235c5ca391eb85d8 0x4362aeda70a1a9ec8d2f857c8e23cb5b5d102055 0x31a4f97fcb813ae6e7ad87827e42590180516faa 0x354c4bad7f7b79d5ff07e9a3d311b0194795ee18 0xbd6f652f9149911452452a48a91fcc69bb0665ca 0x12754cc0abec67fbc38f30012778cc91d43385d6 0x132d268892e7694e0ed412d7b807d776977fdf6a 0x4234082ad0287bd41683a28f5b2c5ed017b07214 0x23f1879de234b35690c44e24becbe24ce079515b 0x21f117c63b236933bc1ec1d73b46a438bf2014d2 0xb2263a43ab937ea2a7f5ef492b39f90bb7bc83e3 0x0acf688664c22e2c53042c7c09ac50c107699be4 0x1dfe17f7dc036ceda5bc9ae2aa9c8a2ae7094458 0xf023a91c526857b7ec81c7a52dccc00b95fedef0 0x7ba5ae050df8090948d41681d9801f0efd4643e8 0x3acd7b89ea20c0d4613454109ed731fc64816aad