ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-E122CCBEE66C
|
Infrastructure Scan
ADDRESS: 0x0a0d5127f9e122104ee9dd4c58b1b32b735f1b3a
DEPLOYED: 2026-05-05 21:09:11
LAST_TX: 2026-05-05 21:50:47
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Active_Trace_Protocol
VISIBILITY: INSECURE_DEBUG_CONFIG
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Loading vulnerability database… 14,202 signatures active. [NET] Requesting storage slots for offset 0x00… [FETCH] Received 91 segments of contract data. [SCAN] Identifying function signatures (0x717be676). [MEM] Simulation buffer: 1024 KB allocated. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0x374acb94903f3bb8e097d0f0d7479efa90f79dc3. [TRACE] Logic branch ‘if (msg.value > 0)’ verified. [VALID] Comparing result with Triada-Security-Standard. [DONE] System halt.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x9335305276afb2dec69a8d2cc6c8f01d3ab03dc2 0x86baeaa47c93b821cfee8f10032bcc27ee1b12c7 0x435868e8aa119d0aaa53274eff091b6d38536e11 0x370e5150711c076d02e1efa84fb8e516ed74ab42 0xe8ee8fad2af90209e29c2d9be341e0aa263bb2b3 0x13c7f93ff50de1dd017a14561693e94842a3e784 0x18e0231feb95eed49bcb3d770e84f41f7fd8292c 0x3447f4be98d7fabedd7febcc4c5ad766c7943024 0x1620122bb92dd9825f32b88362e8f8bec02de777 0x1f52d55c513d8ac9ad7a25b7586fcdff5766695c 0x67cae840833aab69e9354e6af23d73808093b64a 0x19019245113063a185f886e21c143749c3fa49ed 0x6e0d433a5de93a613aad0feb89ffdbc9e0098925 0x32e55fc5b87f1ac62187a533cb3e0da54601aea0 0x24df63499e8116724e8189afa7e9a1f812e62cca 0xa67e0281df972cf121362ddf5bcc135fc33759ad 0x2f0ebeeda37c234b3f602ce6ba18531a4de259a5 0x8e5a2b78a019eb7a97bc5f09eae897c564a4ad97 0x953a241e1fc81f6b7d0e5f060a415bb349c4e45c 0x844f11d923274efec54c209accb5edc8dc8f35fe