ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-63CFB49791B7
|
Infrastructure Scan
ADDRESS: 0x6d722c4819209ab223828b08700bb5267de5883d
DEPLOYED: 2026-04-23 06:07:35
LAST_TX: 2026-04-28 20:42:59
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Verbose_Error_Handling
VISIBILITY: OWNERSHIP_LEAK_DETECTED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] Core initialized. Checking license for cluster-node-7. [NET] Connection established. Peer count: 67. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Building Abstract Syntax Tree (AST) from opcodes… [MEM] Stack depth: 1 / 1024. [VULN] Probing admin methods for ‘Access Control’ flaws. [SIM] Mocking MSG.SENDER as 0xb86ecbc6a499c7c236ce92745de93a7dbf8df961. [TRACE] Return data: 0x41bc74cd… [VALID] Finalizing audit report for 0x6d722c4819209ab223828b08700bb5267de5883d. [DONE] Triada-Engine standby mode. Load: 1%.
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0xcbeaaf42cc39c17e84cbefe85160995b515a9668 0x9fad81793f01ea538a570c73f3c0496689cc0eca 0x7ad662e91eb1214a0efe521aa80ca995766aa81f 0xaef2b7832e7d23db2771f6864746c5ccc1718cb2 0x9b212bce6e76c74ccc7f24e5bb1bb8a85e5d03b5 0x1f7bbc6438f9865c55818e7a643a97d76134844c 0x4c255c9d62bc725fe42c416e8af43a8dc0209b54 0x6490fb70434e57d29cf7bf4cb38b13ce512e6ef1 0xfd4fab8fe39a24bd90c1aa8cc300759c9c8f150e 0x0b9d7efb16f15b526fb5e999a53200e1d7df0057 0x117a31cda2d8093a931f3559c4afc03ca3f0e63d 0x3bb3f9d687986d76f82961456036df9ba3ff2f43 0xeb3900258b9f464247d2dc0977d96571c2744a16 0x7d0ec2594ae8ea81e0957e2008760dd70a29e860 0x5a9b28455eac61ac8034f4c4fe03c88d912bbf45 0x5bed68650aadee31efecc1219fc511cab85d7508 0x1d345122a5fbd83a1d4910050c945eabe29bf2a8 0x75244d4a953f926a078d0c3c907ded39ea79a03c 0xf124394f95d98b044578a4cc4f4f5c54262084ac 0x7bb4eaf769e7ac92c022f55c45195161aeacf26d

